The Biggest Cyber Threat To Your Business Is In Your Pocket

According to a Verizon study, one in three businesses has admitted to suffering a breach as a result of a mobile device. The same study found that 80% of businesses were aware that they had a big gap in their network security as a result of mobile device usage.

Banning the use of mobile devices for work is not an option, however. The productivity benefits of these mobile devices are too big to give up, and chances are, employees will still use them.

So how can you make sure that your data is safe as it travels around in your (and your employee’s) pockets?

Basic protection for all operating systems

Regardless of your operating system and device model, the following security protocols can easily be implemented.

Fingerprint and/or face recognition and secure passcode – this feature not only protects you, but your employee as well. Highlight and encourage employees to set this security feature up on their devices.

Offer internal support to help less tech-inclined employees to set this up and troubleshoot common challenges with unlocking the device with these features.

Not only will this help keep your information secure if the device is lost, but it will also help prevent other unauthorized individuals from accessing your device if it is left unattended.

Use a VPN – A VPN provides a secure phone connection to a private server between your devices and your data and bypasses using public networks to access your information. This helps secure the data and encrypts it as it travels from point to point.

Enable data encryption – Both Android and iPhone devices can be encrypted through the device and it is highly recommended that you encourage your employees to activate this feature. has detailed instructions on how to do this for both Android and iPhone devices.

Set up remote wipe capabilities – Depending on the device, there is a function along the lines of Find My Phone that you can have implemented that will allow you to remotely lock and erase the device in the event it is lost or stolen.

Apple devices have the function built into the operating system and Android devices can enable this feature with app downloads.

Mobile protection for Android users

One of the great things about Android devices is that you have a variety of manufacturers, features, and price points to choose from.

While they might differ slightly in features and functionality, here are some basic tips for protecting your Android device:

  • Only buy Androids from vendors who are proactive in issuing security patches
  • Use 2FA (Two-factor authentication)
  • Take advantage of built-in security features
  • Do not save all passwords
  • Only buy apps from Google Play
  • Always, always back up the device’s data
  • Encrypt your device (See instructions above)
  • Be careful about connecting to public WiFi, and be diligent about securing your own WiFi networks.
  • Use the Android security app
  • Install a VPN

Mobile protection for iPhone users

Regardless of the model, all Apple iPhone devices will have the following security features. Keep in mind, however, that older models of the phone will not be able to take advantage of the newest iOS and may require an upgrade.

Here are 10 tips for keeping your iPhone safe:

  • Update the iOS frequently. You can opt into automatic software updates through your phone as well so you don’t have to keep an eye out for new updates
  • Enable 2FA (Two-factor Authentication)
  • Set the phone to “self-destruct” or wipe the entire phone after someone fails to access the phone 10 times.
  • Activate “Find my iPhone.”
  • Avoid public WiFi
  • Only use trusted iPhone charging stations
  • Change your iTunes and iCloud passwords regularly.
  • Revoke permissions to your camera, microphone, etc
  • Use a passcode longer than 4 numbers
  • Disable Siri access from the lock screen.

Take the next step

These tips will get you started on keeping your business, and personal, information safe as you roam. But this is just the first step. Take the next step and set up a full security audit to see where there may be a crack in your armor that leaves you vulnerable.

VoIP Poised To Replace Traditional Phone Lines

Jason Cooley is Support Services Manager for Tech Experts.

VoIP (Voice over Internet Protocol) is not a new technology, although many of us are just learning of this internet-based communications protocol.

First used in 1970, VoIP uses your local area network (LAN) to send small digital packets over the internet to the recipient. Advances in the reliability and sound quality have encouraged end-users and businesses alike to cut the cord on the traditional phone-line and adopt the more versatile, and yes, less expensive telecom solution.

As we see it, there are nine reasons VoIP outperforms traditional phone lines aside from the cost. They are:

Your business is not static. It is cyclical. Guessing each upgrade cycle how many lines you will need is frustrating and can be expensive. If you guess too high, you pay much more than you need to.

If you guess too low, you can stagnate your business growth. Additionally, legacy solutions have a limit as to how many phones can be connected – but VoIP does not. The possibilities are limitless when it comes to VoIP.

The key to gaining a competitive edge is moving faster than your competition. VoIP solutions can manage changes in volume and users within minutes and removes any ceiling that might affect your communications solution as you grow.

In this modern work environment, employees are demanding more flexible work arrangements, including the ability to take and make calls from anywhere.

Statistics even show how flexible work arrangements also increase employee productivity, allowing workers to still connect even during a sick day or outside appointment. VoIP enables this type of mobility through a simple dashboard that allows you to choose which line will get the call.

Advanced features
VoIP is evergreen. Meaning it will always deploy the most advanced features on the market with no additional cost to you as the end-user.

Updates are automatically filtered and deployed to your location through the same lines the device uses to communicate.

Digital communications technologies like VoIP and Unified-Communications-as-a-Service have one huge distinctive advantage over copper lines: flexibility.

The phone number associated with the device is not tied to one particular device in one specific situation. Instead, several devices can be tied to the same extension, and you can decide which device should ring at which time.

Or, if you forgot to change your call flow and need your calls to reach you only on your cell phone and you have left the office, internet-based dashboards enable you to make those changes on the fly and from any internet-connected device.

Reduced complexity
In the golden days of business telephony, the effort and expense to install a PBX was costly – between paying for the certified individual to set up, install all devices, and do adds, moves, and changes throughout the span of the technology’s lifetime, to the simple cost of buying the equipment, paying for the electrical needs to run it and the space to house it.

Every interaction with the system required certified engineers. A new employee’s ability to communicate was dependent on the schedule of the technician to be able to add the user. But VoIP removes all of these complexities. The solution is mostly software-driven, instead of specialized hardware, and accessed with a simple graphical user interface (GUI).

Day to day management of the solution can be handled by administrative personnel, reserving your IT staff for the more complex needs of your business.

A myth has surrounded VoIP and cloud solutions almost since inception. There has been a perceived security risk to a corporation’s data that has persisted, even though the myth has frequently been debunked. Recent studies have found that on-premise solutions are at the same amount of risk of a breach as cloud solutions, and sometimes even greater risk.

A survey by Alert Logic back in 2012 actually found that on-premise solutions were at a greater risk of compromise and data loss, with on-premise solutions being attacked 61.4% and cloud solutions only 27.8%. The fact is, as your service provider, we put your security at the top of our mind when devising and offering solutions such as VoIP and other cloud offerings. Our staff is certified and participates in frequent educational opportunities to learn about the latest cyber-security risks and protection strategies.

VoIP is not new and has been used in some form since the 1970s. It has recently gained popularity as the technology has grown and proven itself to be a serious competitor to the traditional telephone.

Because VoIP has been in use for almost 50 years, many of the original sound quality issues have been resolved. Thanks to innovations in sound compression and advancements in IP connections, VoIP actually provides superior sound quality as long as there is a high bandwidth and robust internet connection.

Business continuity
You may have heard horror stories about VoIP connections and outages. And while in those early years, these stories were warranted. Internet connections were wildly unreliable, and since VoIP ran over these connections, if they went down, so did your phone.

But now, internet providers have made considerable strides in the reliability and strength of their IP connections, making outages rare.

Add in cellular technologies as a failover, VoIP solutions can actually failback on the cellular 4G or 5G network and continue services in the event of an internet outage, meaning you remain connected regardless of the status of your internet connection.

It is no longer a matter of if, but when the copper lines that have serviced our telephones for generations will be phased out. Major carriers, such as AT&T and Verizon, have listed a sunset date for the maintenance of these copper wires to occur next year. Yes, in 2020, if a copper line goes down, the operator will not need to replace the line, but instead, transfer your service over to the digital solutions.

Start your migration today, and avoid the headache of a forced migration when you are least expecting it. Talk with one of our staff today to see how we can help you manage the transition and keep your business connected.

Can Anyone Really Track Your Phone’s Precise Location?

It’s 2019 and everyone willingly carries a tracking device in their pockets. People can have their precise locations tracked in real time by law enforcement, the government, and advertising companies. It may sound like dystopian fiction, but it’s a reality.

How law enforcement can track your location
AT&T, Sprint, and T-Mobile all sell data — including geographic locations associated with customer phone numbers — to a variety of sketchy third-party companies. This data, for instance, can be used by the bail bond industry to track people down, sometimes as accurate as a few hundred feet of their location. There’s not much oversight and rogue bounty hunters have access to the data. And this isn’t even a new problem.

Back in May 2018, The New York Times reported that this could happen. After the story broke, cellular carriers promised to do better. AT&T, Sprint, and T-Mobile have all promised to stop selling this data to aggregators. And it appears that Verizon already stopped before the New York Times story.

How the government can track your location
It’s worth emphasizing that the government itself can still get access to your location data from your cellular company. They just need to get a warrant, then serve that to your cellular service provider.

If the technology exists, the government can get access to it with a warrant. It is quite a change from decades ago when the government had no way to track people’s real-time locations with a device that’s nearly always on their person.

The government doesn’t even need to get your cellular company involved. There are other tricks they can use to pinpoint your location with even better accuracy, such as by deploying “stingray devices” near you. These devices impersonate nearby cellular towers, forcing your phone to connect to them.

How advertisers can track your location
It’s not just your cellular carrier. Even if your cellular carrier perfectly safeguarded your data, it’d probably be very easy to track you thanks to the location access you’ve given to apps installed on your smartphone.

As innocuous as they may seem, Weather apps are particularly bad. You install a weather app and give it access to your location to show you the local weather. But that weather app may also be selling your data to the highest bidder. You likely didn’t pay money for your weather app, so the developers will need to make money somehow to keep the lights and servers on.

The city of Los Angeles is currently suing the Weather Channel, saying that its app intrusively mines and sells its users’ location data. Back in 2017, AccuWeather was caught sending its users’ location data to third-party advertisers — even after updating the app to remove that feature.

It’s best to avoid giving third-party apps access to your location. Stop using third-party weather apps and use your phone’s built-in weather app instead.

How your family can track your location
Your phone is capable of determining its location and sharing it in the background, even if the screen is off.

You don’t need to have an app open. You can see this for yourself if you use a service like Apple’s “Find My Friends,” which is included on iPhones. Find My Friends can be used to share your precise real-time locations with family and friends. After you give someone access, they can open the app, and Apple’s servers will ping your phone, get your location, and show it to them. Of course, this is only with your permission, but it just shows how pervasive this technology is.

Protect Yourself Against The Phone “Port-Out” Scam

Chances are that you probably haven’t heard of the port-out scam. However, just because it is something that has yet to attract widespread attention doesn’t mean it’s not a threat you should take seriously. Let’s take a look at why.

What Is a Port-Out Scam?
It’s very common for people to take their existing phone numbers with them when they switch mobile provider. Recently, unscrupulous individuals have been taking advantage of the ease with which this can be done by porting other people’s numbers and essentially taking control of them.

Here’s how it works: Someone calls your carrier or visits the store and pretends to be you. They then instruct the provider to port your number to a new carrier. Without warning, you find your cellphone service has been cut off, and some stranger has complete control of your number. A variation of this is SIM hijacking, which operates in a similar way but the attacker orders a new SIM.

Why Should You Care?
Losing the ability to use your phone is the least of your worries. Once the attacker has control of your phone, they will receive all your messages. If you have set up banking security measures that involve SMS authentication, the hijacker can potentially access your bank account and many other sources of highly sensitive information.

How To Protect Yourself
Fortunately, it’s really easy to avoid the port-out scam. All you need to do is add a security PIN to your account. From that point onward, people will not be able to make any type of change to your account without citing the PIN. As such, you are protected against both the port-out and SIM hijacking scams. Most carriers will let you set a PIN quickly and easily online or via the phone.

How to Cut Down Your Mobile Data Usage

With unlimited mobile data plans being few and far between, it is imperative to monitor and manage your data usage to prevent outrageously high cellular bills. Even if you have an unlimited plan grandfathered into your service, there are other benefits to cutting down your mobile data usage, including increased battery life on your device and faster service in general. Try these tips to keep your data usage at a minimum:

• Track your usage. It’s impossible to set a usage goal or identify problems without knowing how much data you use and how you use it. Within the settings of your smartphone, you can easily find how much data you’ve used in a billing period and even set warnings for when you approach your data limits.

• Identify what applications use the most data. This can also be done within your smartphone’s settings where you can see app usage at a glance and can also set warnings or cut-off limits at this level. After assessing how much data each application uses, you may even want to delete the most data-hungry ones.

• Take advantage of free WiFi. A wide array of businesses offer free wireless Internet service as a perk to customers, so don’t pass up the opportunity to get your high-usage needs met at no expense to you. You can even configure your settings where applications only update when WiFi is available.

• Put the stymie on streaming music and video. While you may like to show your friends the latest footage off of YouTube or listen to your playlists while on a run, these activities come with a high data usage price tag. Try waiting to view videos until WiFi is available and make your playlists available offline to listen to them at will without any costly data usage.

Just by implementing these simply usage-reducing and awareness strategies, you can greatly decrease your cellular data bill and the workload on your smartphone device. This is a win-win no matter how you look at it.

New Security Risk For Android Phones

Just when you thought you had safeguarded your mobile device from any misuse, a new threat emerges.

For Android users, it’s a big one. Rapid7 has recently discovered a security bug that allows cyber criminals to access a smartphone user’s data.

Although this security problem is widespread, Google has responded that it will take no action to fix it. The bug exists in phones operating on Android 4.3 and below, and allows hackers to control your smartphone.

Although Android 4.4 and 5.0 users are not vulnerable to this risk, this issue affects approximately 60 percent of Android users – almost a billion people worldwide.

Google’s official response is that their policy is not to develop fixes for older software versions, but it can notify people of the risk and others are welcome to create their own fixes.

To date, there are no known patches to address this issue. There is, however, one way to ensure your safety if you possess an affected smartphone. Simply download and install a newer version of the operating software.

Security Tips For Your Smart Phone

Today it is fairly easy to carry out business tasks using smart phones. Emailing, browsing the Internet and even creating or editing documents is now a breeze.

So technically, smart phones are now carrying a large amount of sensitive data that needs to be protected. Not only are Smart phones subject to the same threats as PCs, but they are also quite easy to misplace and lose.

Here are a few tips that will help you mitigate some of these security risks:

Screen lock the phone
Whenever you leave your phone unattended, lock your smart phone to require a password or PIN code or set it to lock after few minutes. This will prevent unwanted access and will protect your data in case the phone is lost or stolen.

Enable remote device wipe
Check if your phone allows the memory-wipe function in case it is lost or stolen. Some phones have this feature embedded, but most others will require that you download an app and potentially pay for the service that goes with it.

Apply system updates
From time to time, smart phone vendors, mobile carriers, or hardware manufacturers update the operating systems on their phones. These updates usually include useful and necessary security-related improvements.

Turn off Bluetooth discovery mode
Many people leave their smart phones on Bluetooth-discovery mode around the clock. On some phones, this feature is set by default; however, check your phone and make sure it is disabled when you are not using it. Failing to do so, your phone will constantly be discoverable to others and allow people to connect to your device without prior authorization.

Install mobile anti-virus
Malware purveyors are increasingly targeting smart phones. It is now important to use anti-virus software for your phone just like you would do for your PC.

This is particularly important for Android devices as they are built on an open platform susceptible to malware.

Why Your Company Should Make The Switch To VoIP

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

We made the switch to a Voice over IP (VoIP) phone system a few weeks ago. I opted for an in-house telephone server, but could have easily chosen a hosted option that didn’t require any hardware in the office except for phones.

A growing number of small businesses are making the same switch. While it can be a lot of work to overhaul the entire telecommunications system of your small business, it is definitely worth considering in light of the ever-increasing costs of traditional services.

What is VoIP?
VoIP is a method of making phone calls using the Internet as opposed to using typical landlines. VoIP services integrate Internet connected IP phones, which look pretty much like traditional office phones, except they plug into an Internet connection with an Ethernet cable.

Cost effectiveness
The biggest VoIP attraction is low cost. Since they’re Internet-based, hosted systems usually require little to no hardware investment. You might need to upgrade your firewall or Ethernet switches to accomodate the increased traffic.

An in-house system requires an investment in a mid-grade voice server, the phone system software, new phones, and possible network upgrades. The equipment cost is around half of what a traditional phone system would cost.

We’ve seen our monthly phone bill drop from over $300 per month to less than $60 using VoIP carriers instead of a traditional phone company.

Hosted fees run from $20 to $30 per extension, which includes all of your local and long distance calling, and the rental of the cloud based phone system.c150103_m

VoIP is particularly cost-effective, if you have employees working from satellite offices or telecommuters.

A telecommuter can take a VoIP phone home and make calls by plugging it into his home Internet connection to make and receive calls on the company lines at no additional cost.

Other benefits
Certain VoIP service providers have introduced mobile apps that allow workers to make and receive phone calls on their mobile devices using the company phone numbers. Their privacy is therefore protected since they do not give their personal phone number.

In addition, the company owns the line so if an employee leaves, calls are routed to the company rather than the employee’s cell phone.

Things to consider
While the mobility and scalability of VoIP systems are attractive, there are a few things to keep in mind. Since VoIP services depend on an Internet connection, if the connection fails, the phones would be dysfunctional.

In a business such as ours, where phones are integral to daily operations and client service, we would strongly recommend a backup Internet connection.

Almost all VoIP systems also have a fail over function, where the system will automatically route incoming calls to another number, such as a cell phone, if the Internet goes down.

The future
The increase in VoIP adoption is undeniable, and analysts predict that it will become the predominant business phone service over the next decade. Our system works great, and I’m glad we made the switch!

(Image Source: iCLIPART)

Mobile Device Management Is Key In Securing Your Network

by Jeremy Miller, Technician
Mobile devices have been finding their way into the workplace since the cell phone was invented. Since the evolution of mobile devices in the workplace is rapidly growing and changing it can be hard to make sure that your device is not leaking company information intentionally or even unintentionally.

Information Technology (IT) has had to evolve alongside mobile technology and how to secure devices without restricting too much access.

There are usually two options of allowing mobile devices in the workplace. You can provide your employees with a company owned device or you can allow them to use their personal device.

Providing your employees with a company owned device allows you to monitor every detail about the phone including calls, messages, installed apps and location of the device. This is possible because the employee can expect no privacy from the company on this device.

When you allow an employee to use their own device at work you have to take their personal privacy in consideration. You might not want to monitor their phone calls, messages and apps installed.

Instead you can make the device more secure. You can install monitoring software that will allow you to lock the device if it gets lost, wipe the device if you know it may have fallen into the wrong hands, or find the device by using GPS location.

We have the ability to install our monitoring software onto any Android or iOS device and choose a profile that will suit a personally owned device, a company owned device or we can even customize a plan that will suit your needs even more specifically.

Since mobile devices are prone to getting lost or stolen they need to be protected in the best way that you can. In most cases installing monitoring software is the best solution.

This is because we can monitor the phone without interfering with the device usage. Once the device is compromised we can act quickly to get the device secured.

On the other hand if you notice an employee is acting suspiciously you can monitor their phone usage to determine if they are wasting time or acting maliciously against the company and take action before something more serious happens.

The best part about managing your mobile devices through Tech Experts, is that we are very competitive with other personal phone security managers out there in both price and features.

Our prices are very affordable and services can be easily customized to meet your needs.

It takes just about as long as installing an app to your phone as it does to setup our management software on any mobile device running Android or iOS.

You will be able to rest assured that your mobile devices are virtually safe from data loss, your employees are using their resources and time accordingly, and in the event of an issue we will be there to assist you in any way we can.

If you are interested in trying out our mobile device management service please contact us and we will be happy to help you with any questions.

BlackBerry To Profit From Patents

by David Stone, Technician
After a little over a decade of being a main mobile power in the business world, Blackberry (NASDAQ: BBRY) is fading to black.

The smartphone and tablet manufacturer is getting edged out by an array of factors: First they waited too long to release a device that could compete with Android and iOS, and then fell short on innovative features and operability. Secondly, they failed to market their devices to generate the kind of “tech buzz” needed to drive consumer sales these days.

While Blackberry reigned supreme as the go-to business message service and mobile emailing solution, they were surpassed by changes in industry and social popularity.

Perhaps they made changes too little too late, or perhaps they thought that their grip on the business world would ever cease. Either way, they will forever be an example of how refusing to adapt and change or not being able to see the coming change will extinct your business.

The announcement of profit losses was preceded by a work force reduction plan and the possibility of going private. Both indicate a company in turmoil, not a tech giant about to reinvent the way people connect and share data. The future for new devices looks bleak at Blackberry, but the future of the company looks like it might have some options that provide low-maintenance profitability.

In addition to being the 6th largest manufacturer of mobile devices (smartphones & tablets) Blackberry also provides mobile internet service to 91 countries on a worldwide network of over 500 mobile carriers.

Blackberry also holds a lot of proprietary patents, which much like Microsoft will generate plenty of income with little to no cost. This would essentially turn the company into a technology holding company, with a focus on maintaining licensing not developing new hardware. In effect, this would hand the company over to the lawyers and wrestle it away from the engineers. That does not bode well for any company that wants to be an industry trend-setter.

With stiff competition from Android and iOS, a former industry standard in the world of mobile computing is all but gone. Perhaps it will remain in the ring for a few more rounds with a cult-like following of users, or maybe they will break into the services sector and resurge as a mobile-enhancement services company.