<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>emdnet</title>
    <link>https://www.emdnet.com</link>
    <description />
    <atom:link href="https://www.emdnet.com/feed/rss2" type="application/rss+xml" rel="self" />
    <item>
      <title>Out of sight, out of mind (so clear your desktop now)</title>
      <link>https://www.emdnet.com/out-of-sight-out-of-mind-so-clear-your-desktop-now</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+12.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Arrange, sort, and prioritize
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Before you go about deleting everything from your desktop, think about what you really want to keep. This will vary from person to person, but most people use their desktop for storing files, folders, and app shortcuts that they want to access quickly.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Take the time to prioritize your files and folders. An easy way to do this is to right-click on an empty area of your desktop (where there are no icons) and select Auto arrange icons. This will organize your icons into a grid format that makes it easier for you to see and work with them. Then, right-click on the empty space and hover your mouse over Sort by and select Date modified to arrange the icons by the date they were last opened, with the latest on top.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Create a folder for holding files and another for keeping app shortcuts
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           People often use their desktop to hold files like downloads, photos, screenshots, and even email attachments. This can lead to a messy desktop in a short period of time.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In truth, you probably don’t need all these shortcuts on your desktop. Instead, create a folder on your desktop that will serve as your dumping ground for all your nonessential files and folders.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you don’t intend to keep a file, icon, photo, etc. for long, put it in this folder. Revisit this folder every once in a while to delete the files you no longer need.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It also helps if you create a shortcut folder. When you install new programs on Windows, a shortcut icon is often automatically added to your desktop. However, these desktop shortcuts should be for frequently used programs only. Create a separate folder for programs that aren’t used that often.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Be ruthless in cleaning
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Once you have your folders set up, it’s time to get rid of the clutter. If you haven’t used a file, folder, etc. in the past two months or so, you should seriously consider getting rid of it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Examine your desktop and be ruthless in cleaning:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Uninstall programs you no longer use.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Delete unimportant files, such as screenshots you no longer need.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Place the rest in relevant folders.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Once you’ve completed these, check your browser to see where it stores downloaded files. If your browser downloads files onto your desktop by default, go to Settings and change the target location to the Downloads folder.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Maintain order
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Once you have decluttered your desktop, you must stick to the rules you’ve made. Whenever you download something, ask yourself whether this should go to the desktop, your dumping folder, or someplace else.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Of course, sticking with these rules won’t always be easy, so take time once or twice a month to revisit your desktop and clean it up a bit.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5. Use the taskbar or Start menu for apps
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With Windows 10, you can pin apps to the Start menu and the taskbar. This is a great alternative to having program shortcuts on your desktop. To pin apps, open your apps list (i.e., click the Start menu icon at the bottom left corner of the screen) and right-click on the application you would like to pin. Simply select Pin to Start or Pin to taskbar for the option you want.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           6. Choose a wallpaper you love looking at
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           An interesting way to minimize clutter is to pick a wallpaper that you enjoy looking at — whether it’s your favorite slogan, a photo of your family, or a picture of your dream house, car, or destination. Having an image you like serves as a reminder to keep icons to a minimum, so if you can’t see the image anymore, then you have too many icons, and it may be time to get rid of a few.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you are looking to learn more about using Windows in your office, contact us today to see how we can help.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/08/out-of-sight-out-of-mind-so-clear-your-desktop-now/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 28 Oct 2020 02:51:42 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/out-of-sight-out-of-mind-so-clear-your-desktop-now</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>What does proactive cybersecurity entail?</title>
      <link>https://www.emdnet.com/what-does-proactive-cybersecurity-entail</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+1.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Understand the threats you’re facing
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Before any small- or medium-sized business (SMB) can work toward preventing cyberattacks, everyone involved needs to know exactly what they’re up against. Whether you’re working with in-house IT staff or an MSP, you should review what types of attacks are most common in your industry. Ideally, your team would spearhead this review a few times a year.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Reevaluate what it is you’re protecting
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Once you have a list of the biggest threats to your organization, you need to take stock of how each one threatens the various cogs of your network. Map out every company device that connects to the internet, what type of data they have access to (regulated, mission-critical, low-importance, etc.), and what services are currently protecting those devices.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Create a baseline of protection
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           By reviewing current trends in the cybersecurity field and auditing your current technology framework, you can begin to get a clearer picture of how you want to prioritize your preventative measures versus your reactive measures.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Before you can start improving your cybersecurity approach, you need to know where your baseline is. Devise a handful of real-life scenarios and simulate them on your network. Network penetration testing from trustworthy IT professionals will help pinpoint weak spots in your current framework.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Finalize a plan
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           All these pieces will complete the puzzle of what your new strategy needs to be. With an experienced technology consultant on board for the entire process, you can easily synthesize the results of your simulation into a multipronged approach to proactive security.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Proactive measure
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What it entails
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Security awareness seminars for all internal stakeholders
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Train everyone from the receptionist to the CEO about effective security practices such as password management, proper mobile device usage, and spam awareness.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Updated anti-malware software or cloud-based service
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Protect your data and systems against the latest and most menacing malware.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Routine software patches and upgrades
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Minimize the chances of leaving a backdoor to your network open.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Web filtering services
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Blacklist dangerous and inappropriate sites for anyone on your network.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Perimeter defenses (e.g., intrusion prevention systems and hardware firewalls)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Scrutinize everything trying to sneak its way in through the borders of your network.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Policy of least privilege
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Limit users’ access only to the data they need to fulfill their tasks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Data segmentation
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Rank data according to sensitivity and build micro-perimeters around high-value datasets.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Full-disk encryption
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Make data stored in computers and portable devices unreadable so that if these machines are stolen, the files they have inside remain secure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Virtual private networks
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Make data transmitted across unsecured connections unreadable so that intercepting it would become futile.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Strict access controls
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Prevent unauthorized access to accounts by using strong passwords, multifactor authentication, and auto screen locks and logouts for idle users. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           AI-powered network monitoring
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Identify suspicious user and software behaviors such as employees accessing files outside their departments.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As soon as you focus on preventing downtime events instead of reacting to them, the productivity and efficiency of your IT infrastructure will increase to levels you’ve never dreamed of. Start your journey to enhanced cybersecurity by giving us a call for a demonstration.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/?p=36031" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/shutterstock_336698507%2B-281-29.jpg" length="1962935" type="image/png" />
      <pubDate>Thu, 22 Oct 2020 01:45:11 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/what-does-proactive-cybersecurity-entail</guid>
      <g-custom:tags type="string">strict access controls,full-disk encryption,antivirus,intrusion prevention systems,security patches,data segmentation,virtual private networks,cybersecurity,security awareness training,2020october23security_a,web filtering services,cloud-based anti-malware,olicy of least privilege,anti-malware software,,software upgrades,hardware firewalls,ai-powered network monitoring</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/shutterstock_336698507%2B-281-29.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/shutterstock_336698507%2B-281-29.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How does Microsoft 365 prevent phishing?</title>
      <link>https://www.emdnet.com/how-does-microsoft-365-prevent-phishing</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+2.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
         This is a subtitle for your new post
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Phishing remains one of the top cyberthreats to businesses today. Because of this, Microsoft invests a lot of time into securing its email service.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Among the many business solutions that Microsoft offers is email hosting through Outlook. This service is protected by Microsoft Defender for Office 365. Defender has many key features:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Anti-phishing
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The most dangerous types of phishing scams masquerade as emails from a party the victims know, such as their boss, colleague, business partner, or bank. A phisher may use crafty impersonation tactics, such as referring to the victims by their nickname, making it harder to immediately identify the scam as fraud. A cybercriminal may even take over actual email accounts and use these to completely fool their victims.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Using machine learning, Defender creates a contact graph of contacts that users normally exchange communications with. It then employs an array of tools, including standard anti-malware solutions, to differentiate good from suspicious behaviors.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Anti-spam
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Generalized phishing campaigns utilize spam emails, which are sent to a large list of email addresses, to catch random victims. Stopping spam is, therefore, a great start to protecting your company from a phishing attack.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft 365’s anti-spam technology addresses the issue by examining both an email’s source and its contents. If an email is determined to have come from an untrustworthy source or has suspicious contents, then it is automatically routed to your spam folder. What’s more, this feature checks the activity of people in your company to ensure that none of them sends out spam emails.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Anti-malware
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Malware, such as ransomware and spyware, can spread via phishing emails. Ransomware locks data and programs from users until a ransom is paid. Spyware, on the other hand, steals data by recording keystrokes, copying clipboards, and taking screenshots, among other methods.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft 365 employs a multilayered defense against both known and unknown types of malware. This covers the different stages of email transmission, including filtering potentially harmful attachment formats, and real-time threat response. Microsoft also regularly deploys malware definitions to keep its defenses updated.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Safe Attachments
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Some phishing emails contain file attachments that infect your computer with malware. Any email attachment should be handled with caution, but it’s not uncommon for some users to accidentally click on one, especially as they rush through the messages in their inbox.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Defender resolves this issue by opening all attachments in a sandbox first. This sandbox is an isolated environment, so even if the attachment contains malware, it would not affect your system. While in the sandbox, the attachment is meticulously scanned. If it’s clean, Microsoft 365 will allow you to open it as normal. If it contains a threat, the service will notify you of the issue. Microsoft uses some of the information collected by Safe Attachments to further improve the feature’s capabilities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5. Safe Links
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Instead of attachments, some phishing emails contain URLs that lead to websites — often spoofed versions of legitimate websites — that require victims to provide their personal information such as their account credentials. Some of these URLs lead to download pages that infect your computer with malware.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In a process called URL detonation, the Safe Links feature protects users by scanning the links in their emails and checking for malicious behavior, such as the transmission of malware. If the link leads to a malicious website, Defender will warn users not to visit it. Otherwise, users can proceed to click and go to the destination URL without a hitch. But even so, the service will rescan the link in the succeeding days and report any suspicious changes.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What’s great about Safe Links is that it doesn’t just scan links from unfamiliar sources. It also scans links in emails from people within your company and works on files uploaded to Microsoft Teams and SharePoint.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           6. User Submissions
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft 365 allows you to set a specific mailbox to send emails you deem a threat. The User Submissions feature lets you set criteria for both malicious and safe email and identify mailboxes besides your spam folder to keep these messages in. This feature gives your administrators greater control over which emails to flag and which to report to Microsoft.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           7. Enhanced Filtering
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If your company uses third-party services to route emails before they are sent to Microsoft 365, you will benefit from Enhanced Filtering for Connectors. Microsoft 365 uses inbound connectors to determine the trustworthiness of email sources. The more complex your routing scenario is, the more likely that an email’s inbound connectors will not reflect its real source.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Enhanced Filtering preserves authentication signals that may have been lost over the course of routing emails. This maximizes the effectiveness of Microsoft 365’s overall filtering capabilities, helping it detect spam and phishing emails.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you need an email service that promotes efficiency while protecting your business, we can implement and manage Microsoft 365 for you. Just call us today to get started.
           &#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/10/how-does-microsoft-365-prevent-phishing/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 15 Oct 2020 02:04:15 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/how-does-microsoft-365-prevent-phishing</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>4 Tips to help you capitalize on technology</title>
      <link>https://www.emdnet.com/4-tips-to-help-you-capitalize-on-technology</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+3.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Be an early adopter
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of the biggest factors in determining how successful your SMB will be in leveraging a new trend is how early you get in. Be careful investing in resources with high buy-ins and/or long-term commitments. Focus instead on low-cost IT solutions that allow you to test and see how well they work for you, and also let you pull out without suffering heavy sunk costs.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Invest in the right tools
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           New tech can be expensive, so how can one take advantage of an emerging tech trend without spending too much? The trick is to repurpose existing tech to do the same thing as the new tech.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For example, John Deere has been selling farming equipment for over 150 years, with no signs of slowing down. When the Internet of Things (IoT) craze began, John Deere figured that IoT would change the way their vehicles serve their customers. But instead of shelling out money for new IoT devices, they simply used already-available mobile devices and GPS tech. This tactic allowed the brand to jump ahead of their competition, especially those who chose to wait out the decrease in price of new tech.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Synergize tech with your business model
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With a little creative brainstorming, most business models can actually integrate new tech into their processes. For instance, at first glance, it appears that clothing retailers have no use for AI that has deep learning capabilities. But one particular AI application — chatbots — has proven to be effective in helping customers find the clothes they want. Here, deep learning directly drives sales.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Prepare for possible difficulties
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           New tech inherently comes with implementation and integration difficulties. But what if you can’t find a way for your products or services to directly interact with the blazing new trend? The next best thing is to provide solutions to problems presented by it. Does interacting with the popular app or activity eat up a lot of mobile device battery? Remind passersby that your outlets are available for customers, or that you sell mobile battery packs. Does it require driving all over town? Inform customers of your latest car rental promotion. Sometimes just associating yourself with the trend is enough.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Not sure how to integrate your business with the latest tech fads? Turn to us — we’re the experts on all things technology related, be it machine learning or Oculus Rift. No question is too trivial — consult with us today!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/10/4-tips-to-help-you-capitalize-on-technology/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 09 Oct 2020 02:07:19 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/4-tips-to-help-you-capitalize-on-technology</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Which Windows 10 version should you choose?</title>
      <link>https://www.emdnet.com/which-windows-10-version-should-you-choose</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+4.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
         This is a subtitle for your new post
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As its name suggests, Windows 10 Home is designed for home and personal use. It comes bundled with key Windows 10 features, such as the Microsoft Edge browser and the voice-enabled virtual assistant Cortana. It also gives access to Microsoft's cloud storage service OneDrive and provides 5 GB of cloud storage per individual user. However, Windows 10 Home doesn’t come with Office apps like Word, Excel, and PowerPoint. Instead, it gives you a 30-day free trial of Microsoft 365.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In terms of security, Home has fairly basic protections. It has Windows Defender Antivirus software, Windows Hello biometric logins that use face or fingerprint authentication, and rudimentary device encryption to keep data breaches at bay. Those with multiple Windows devices will also love the mobile device management app, which allows them to track and control app usage for connected smartphones and tablets.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To explore new apps, Home users can sign up for the Windows Insider program, but since this version is light on features, there is usually a limited selection of early release apps to play with.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows 10 Pro
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you plan to use your computer for work, the Pro version is the right OS for you. One of its most notable features is Hyper-V, which allows you to create virtual machines (VMs) on Windows 10. These VMs can be used to deliver computing resources from a powerful computer to other machines connected to the network, making resource provisioning a breeze.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Considering that businesses are usually targeted by cybercriminals, Windows 10 Pro offers more robust security than Home. In addition to Windows Defender, this version comes with whole disk encryption, Enterprise Data Protection, and Azure Active Directory — an identity management service used to set up and enforce access policies for apps and devices.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Rolling out updates for all computers is also incredibly easy with Pro’s Windows Update for Business service. From a central console, you can manage how and when Windows 10 devices are updated so that they don’t disrupt day-to-day operations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows 10 S
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows 10 S is focused on simplicity, security, and speed. More specifically, it greatly restricts security and other settings, resulting in faster performance. In fact, while S-powered computers have fewer features than Pro, they are reported to boot 15 seconds faster than Pro machines.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows 10 S’s relatively low hardware requirements make it perfect for startups and schools that tend to purchase low-cost PCs. And if you want more features, you can upgrade from 10 S at an affordable price.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What sets 10 S apart from the other Windows 10 versions is that it can only run applications available on the Windows Store. What’s more, it requires you to use Microsoft Edge for surfing the web. Although these restrictions mean you don’t get to enjoy third-party apps, it also protects users from downloading dangerous apps and helps Microsoft easily root out malware.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Still not sure about which Windows 10 version you should purchase? Contact our experts today to get deeper insight. We’ll even install and maintain Windows for you so you can focus on being productive!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/?p=35993" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 07 Oct 2020 02:10:40 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/which-windows-10-version-should-you-choose</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Why using a VPN is more important than ever before</title>
      <link>https://www.emdnet.com/why-using-a-vpn-is-more-important-than-ever-before</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+5.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is a VPN?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A VPN creates a secure tunnel between your device and the websites you visit on the internet. Once you’ve established your PC’s connection to a VPN server, your computer acts as if it’s using the same local connection as the VPN, making it seem as if you’re in a different location. As far as websites are concerned, you’re browsing from that server’s geographical location and not your PC’s actual location.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When you surf the web through a VPN, all the data transmitted and received is also encrypted, preventing anyone, from hackers to government agencies, from monitoring your online activities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why should you have a VPN?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Security and privacy are the main reasons you would want a VPN. For example, if you’re connected to a public Wi-Fi network — like the ones at local cafes and airports — using a VPN encrypts the information you’re sending or accessing online. This means your credit card details, login credentials, private conversations, or sensitive documents can’t be intercepted by a third party.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           VPNs are also useful for accessing geo-restricted websites. If you’re traveling abroad and certain US websites are blocked in that region, you can connect to a VPN located in the United States to access the sites you need.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How do you choose a VPN?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Given the increasing demand for secure online privacy, VPNs are surging in popularity. The following considerations can help you find the right one.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Cost
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           While free VPNs are available, it’s best to avoid them as they could keep logs of your internet activity. In some cases, data collected by free VPNs are sold to data brokers or worse, cybercriminals. Additionally, maintaining a VPN service is also expensive, which means the free ones will likely plaster ads on your browser to make a quick buck.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Paid VPNs like 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://nordvpn.com/" target="_blank"&gt;&#xD;
      
           NordVPN
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            and 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.expressvpn.com/" target="_blank"&gt;&#xD;
      
           ExpressVPN
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           often come with more robust features and configurations that keep you secure. Prices differ depending on a VPN’s features and subscription length, and how you pay is also important. Some VPNs offer anonymous payment systems like Bitcoin, while others allow you to use gift cards to avoid giving out your personal information.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Location
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           The physical location of VPN servers is important if you want to access region-blocked websites. So if you’re planning on accessing a UK-based service, your VPN provider must at least have servers located in London.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Capacity
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Read through a VPN provider’s terms of service to determine how much data you’re allowed to use. If possible, find out how many servers a VPN provider has. If they have plenty of servers online, you can rest assured that they have the capacity to support your internet browsing.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Device compatibility
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Another important factor to consider is whether the VPN can be used across multiple devices. Nowadays, employees work on laptops, tablets, and smartphones, so you’ll want a VPN that’s compatible with various types of devices.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5. IP leaking
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Beyond the fundamental nuts and bolts of the VPN protocol, there are other challenges like dealing with leaky tunnels, which means your IP address could be tracked. A great way to evaluate a VPN service is to sign up for their free trial service and visit 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://ipleak.net/" target="_blank"&gt;&#xD;
      
           IP Leak.
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            This will allow you to check whether your real IP address is being leaked. If it tracks your physical location, you should opt for a more reliable VPN service.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           VPNs are now a vital component of cybersecurity, and if you need help in selecting the right one for your business, consult with our security experts today. We also offer comprehensive cybersecurity services so no hacker or third party can get their hands on your data.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/?p=35990" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 05 Oct 2020 02:14:00 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/why-using-a-vpn-is-more-important-than-ever-before</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Boost productivity with these Microsoft Word tips</title>
      <link>https://www.emdnet.com/boost-productivity-with-these-microsoft-word-tips</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+6.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Work on Word Online
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Don’t have the Word app on your computer, tablet, or smartphone? Go to office.com, sign in with your Microsoft account, and open Word Online, the web version of Word.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Collaborate on files
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You and your colleagues can now edit the same Word document simultaneously in real time. Simply save the document to your Microsoft OneDrive account, click Share, and send the link to the file to your coworkers. People with the link can access and edit the document using the Word desktop app or Word Online.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Keep editorial control
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Use the Track Changes function of Word to monitor all edits made to your document. To turn on Track Changes, click on the Review tab then select Track Changes. When reviewing a colleague’s edits, click Accept or Reject as you see fit.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Do quick research using Smart Lookup
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Smart Lookup feature helps you do online research while you’re working on a document — no need to open another tab and type in a query. Simply highlight and right-click the word or phrase you want to look up, and select Smart Lookup from the menu that appears. Word uses Microsoft’s Bing search engine to conduct a search on the selected word or phrase, and displays the results in a pane that appears on the right side of your screen.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Format your document
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Styles gallery contains predefined formatting options for text. You can also add your own styles, or those you use frequently, to the gallery. By saving your own style preferences, you can apply them anytime without having to manually format everything. Just follow these steps:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Select the text you want to format as a new style (e.g., a heading or a certain phrase).
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Specify the formatting you want on the mini toolbar that appears. For instance, click Bold and Red if you want the text to appear as such.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Click the More arrow in the lower-right corner of the Styles gallery. Select Create a Style. This will open the Create New Style from Formatting dialog box.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Give the style a name and click OK. Your new style will appear in the Styles gallery, ready for you to use anytime.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Look for and insert images faster
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With Word, there’s no need to open your browser to look for images for your document. Just place the cursor in the area where you want to insert the photo, click the Insert tab and select Online pictures (type “clip art” in the search box if that’s what you need), select an image, then click Insert.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Edit a PDF file
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Word’s PDF editing function allows you to make quick changes to PDF files without having to download and use a PDF editing app or software. But before you can edit a PDF file in Word, you have to convert it to a file format that Word can display. Follow these steps:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Click File &amp;gt; Open &amp;gt; Browse.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Choose the PDF file you want to edit, then click Open. Click OK to make a copy of the PDF file and convert its contents into a format that can be opened in Word. (Note: The original PDF will be preserved.)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Make edits to the copy of the PDF file.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            When you’re done, click File &amp;gt; Save as &amp;gt; PDF.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft is constantly rolling out nifty new features for its popular word processor. To stay updated on the latest Word features and functionalities, reach out to our Microsoft experts now.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/09/boost-productivity-with-these-microsoft-word-tips/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 23 Sep 2020 02:17:51 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/boost-productivity-with-these-microsoft-word-tips</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Reasons to automate small-business marketing</title>
      <link>https://www.emdnet.com/reasons-to-automate-small-business-marketing</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+7.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Over the years, marketing automation has become more accessible to small businesses. Thanks to innovative cloud solutions, large and small enterprises can reap the benefits of automating tedious marketing tasks. Here are a few advantages to automating your small business’s marketing efforts.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Inbound lead assignment
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When you have phone calls, emails, and meetings piling up, it’s hard to keep track of which customer needs what and who is working with them. With marketing automation software and tracking, customer service representatives are automatically assigned to inbound leads based on specialties and demographics so they can work on building profitable rapport right away.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Instant responses to email requests
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If a customer or prospect sends your business an email via your website or a “Contact Us” form, any delay in response could ultimately cost you a sale. But if you have a marketing automation plan in place, you can customize automatic email responses to these leads as soon as an email is received. This either provides potential customers with the information they requested or informs them that you will be responding in greater detail soon.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Stop leaving voicemails and start closing deals
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           There’s a reason most people prefer to communicate via email: keeping in touch over the phone can be tough if both parties are always busy. An automated system solves this by logging information about the leads you have contacted and automatically emailing them about follow-up times. The call, email, and response are all logged in your CRM and calendar without a single minute wasted on inputting mundane information.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Give and you shall receive
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Potential clients and leads get dozens, sometimes hundreds, of business emails every day. You need something to set your business apart from the rest. By offering valuable content such as how-to guides and total cost of ownership tools in exchange for contact information, you can create a win-win scenario. Prospects get the content they want, and you get the information you need to make a sale.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           All it takes is a web form and some creative writing that ultimately leads visitors back to your products and/or services. Your automation software delivers content to anyone who provides contact information, and it downloads metrics that can be tracked and analyzed by business analytics tools.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Never type another phone number again
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Networking events mean new contacts and new leads. They used to mean having to keep track of thick stacks of business cards, but cutting-edge marketing tools now make it possible to take a picture of contact information and automatically store it as part of a cloud-based database. Call-ins, scanned business cards, and received emails are all organized into a single digital Rolodex with recommendations on whom to contact and when it is best to do so — without one minute of tedious data entry.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Every business owner knows that automating mindless tasks is worth it. But not everyone knows what sort of tools are available to cut down on wasteful work. Our team specializes in using technology to add value to your business. Get in touch with us today to make your marketing technology work for you.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/09/reasons-to-automate-small-business-marketing/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 18 Sep 2020 02:23:02 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/reasons-to-automate-small-business-marketing</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>7 Customization features to try on Windows 10</title>
      <link>https://www.emdnet.com/7-customization-features-to-try-on-windows-1o</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+8.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Windows 10 offers a wealth of customization features designed to provide users with a truly personalized and intuitive experience. Whether it’s changing the color of your windows or rearranging the tiles on the Start menu, these features will make your Windows PC a better match for your needs and preferences. Check out some of them below.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Change your themes
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The most notable way to personalize Windows 10 is by changing your background and lock screen images. Do this by right-clicking anywhere on your desktop and choosing Personalize. Here, you can choose and preview different backgrounds and themes you can use. You can even add new themes by using images from your gallery or by clicking Get more themes in the Microsoft Store.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Use dark mode
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Want to give your Windows 10 an edgier feel? Right-click on your desktop and choose Personalize. Go to Colors. Under Choose your color, select Dark. This changes the colors of your windows and menus from white or gray to black, and text from black to white. The colors on websites and third-party apps remain unchanged, however.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To restore your default settings, repeat the process but click Light.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Virtual desktops
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you’re having trouble separating your work files from your personal files, try creating a virtual desktop. Press the Windows key + TAB to show all your open windows. Click on the Add a new desktop button at the upper left corner of your screen to create a virtual desktop. While viewing your open windows, you can click and drag windows from one desktop to another.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To quickly switch between desktops, use the keyboard shortcut CTRL + Windows key + left/right arrow. Remove a virtual desktop by pressing Windows key + TAB. Click on the X button on the desktop you want to erase.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           App snapping
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           App snapping is not exactly a new feature, but Windows 10 lets you snap any app in place. Snap an app window by dragging it into any of the four corners of your screen. This changes your window to a fourth of your screen size, allowing you to view multiple windows at once. You can have a maximum of four separate windows simultaneously open in your monitor.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Reorganize your Start Menu
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To add a little more “you” to your Windows PC, you can customize how your apps are arranged on the Start menu. For one, you can resize the Start menu by simply dragging the top or right side of the menu.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You can also resize the live tiles by right-clicking on them and selecting Resize. You can also rearrange application tiles by dragging them anywhere around the Start menu. If you won’t be using a particular application, simply right-click the tile and select Unpin from Start. On the other hand, if you want to pin applications to the Start menu, right-click on an app and choose Pin to Start.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For even faster access to apps, simply pin the programs to the taskbar.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Change color themes
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Is the plain black Start menu not doing it for you anymore? Just right-click on your desktop, choose Personalize, go to Color, and select any accent color that pleases you. Tick the checkboxes under Show accent color on the following surfaces if you want this color applied to the Start menu, taskbar, action center, and title bars.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Disable notifications
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We don’t know where you stand on app notifications, but if you absolutely hate them and wish to never get them ever again, press the Windows key and click on the gear icon to open your Settings. Click System and select Notifications &amp;amp; Actions. Switch off whatever app notifications you don’t want.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Switch up and personalize your Windows 10 however you like by using some or all of these options. If you want more ways to personalize your desktop or if you need information on anything Windows 10-related, give us a call and we’ll be happy to help.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/09/7-customization-features-to-try-on-windows-10/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 16 Sep 2020 02:27:14 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/7-customization-features-to-try-on-windows-1o</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Helpful tips for keeping your email safe</title>
      <link>https://www.emdnet.com/helpful-tips-for-keeping-your-email-safe</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+9.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Use separate email accounts
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Most people use a single email account for all their needs. As a result, information from websites, newsletters, shopping deals, and messages from work gets sent to one inbox. But what happens when someone breaks into it? There’s a good chance they could gain access to all the stored information and use them in fraudulent dealings.
           &#xD;
      &lt;br/&gt;&#xD;
      
           Having at least two separate email accounts will not only boost your security, but it will also increase your productivity. You can have a personal account to communicate with your friends and family, and a professional email account solely for work-related tasks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Set strong passwords
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Some email users often overlook the importance of having strong email account passwords. You might be surprised to learn that email passwords like “123456,” “qwerty,” and “password” are still the most common around. For the sake of security, set longer passwords or passphrases that contain a good mix of upper- and lowercase letters, numbers, and special characters. Make sure these passwords are unique to that account to keep all your other password-protected accounts safe.
           &#xD;
      &lt;br/&gt;&#xD;
      
           You should also consider enabling multifactor authentication (MFA). This creates an extra layer of security by requesting for another method to verify your identity, like a fingerprint scan or a temporary activation code sent to your mobile phone.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Beware of email scams
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When you see a link in an email, don’t click on it unless you’ve assessed its authenticity. You never know where those links might lead you. Sometimes they are safe, but other times they can infect your computer with malware or send you to a compromised website.
           &#xD;
      &lt;br/&gt;&#xD;
      
           It’s always good to know who the email message is coming from. If you’re expecting a file from your friend or family, then go ahead and open the attachment. However, emails coming from unknown sources or those that have strange account names such as “@amazon6753.com” are most likely to be email scams.
           &#xD;
      &lt;br/&gt;&#xD;
      
           These types of attacks are known as phishing, and they can be remarkably clever. For example, cybercriminals may masquerade as high-profile companies like Amazon, Facebook, or Bank of America to catch their victims off guard. They create emails with a sense of urgency by claiming that there’s an issue with your account and that you should send them information or click on a link to “confirm” your personal details. This link will either install malware on your device or lead you to a fraudulent site.
           &#xD;
      &lt;br/&gt;&#xD;
      
           Even if there was a genuine issue with your account, legitimate companies would never ask something so suspicious over email. If you get these messages, contact the company directly through a verified website or phone number — not the contact details on the email.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Monitor account activity
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Periodically watch over your account activity. Make sure to limit access privileges to apps if you want to ensure maximum privacy and security. Also, check for any suspicious activities in your logs, such as unusual devices and IP addresses that have accessed your account. This indicates that hackers may have successfully broken into your account. If this is the case, sign out of all web sessions and change your password as soon as possible.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Encrypt emails and update your software
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Email encryption ensures that any message you send won’t be intercepted and viewed by unauthorized users. Meanwhile, installing the latest updates for your anti-malware, firewalls, and email security software filters potential email scams and fixes any vulnerabilities hackers can exploit.
           &#xD;
      &lt;br/&gt;&#xD;
      
           Protecting your email accounts from various threats can be a daunting process, but with the right support, it should be effortless. Talk to us today for all your cybersecurity needs.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/09/helpful-tips-for-keeping-your-email-safe/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 14 Sep 2020 02:29:47 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/helpful-tips-for-keeping-your-email-safe</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>The difference between Groups, Yammer, and Teams</title>
      <link>https://www.emdnet.com/the-difference-between-groups-yammer-and-teams</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+10.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Outlook Groups
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With Outlook Groups, every member gets a shared inbox, calendar, project planner, notebook, and document library. You can also connect to third-party apps such as Twitter, Trello, and Mailchimp, so notifications are sent directly to your shared inbox.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This means all relevant messages and information are sent to one place, so if most of your conversations are done via email, Outlook Groups is ideal. What’s more, HR and sales departments that communicate with external parties will also find plenty of uses for its email features.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A big downside of Outlook Groups, however, is email overload. Because all messages and notifications are sent to one inbox, users may become overwhelmed by the number of emails they have to sort through every day.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft Teams
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft Teams, a chat-based collaboration platform similar to Slack, works with Skype for Business so you can text, call, video chat, and share files with colleagues. Thanks to its seamless integrations with other Microsoft 365 programs, you can even work on shared files without leaving the app.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Unlike Groups, Microsoft Teams is designed for more advanced collaboration, making it great for completing projects with tight deadlines or other tasks requiring immediate feedback.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Yammer
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Much like Groups and Teams, Yammer works well with other Microsoft 365 tools like Outlook and OneDrive. However, Yammer is a professional social media app designed to foster open communication and break down barriers between teams.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With Yammer, important files and announcements can be shared with the entire company like an office bulletin board. Users can also see the most popular post on their feeds, follow it, and even comment.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Yammer also takes design elements and features from social media apps like Facebook, making it a popular choice for companies with millennials in their workforce.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Although we’ve discussed the fundamental differences between Groups, Teams, and Yammer, we’ve barely scratched the surface of what each app can do. To figure out which apps you need, you must understand how your employees work, how they prefer to collaborate, and what you want to achieve from such collaborations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           But there’s another way to find the right app for your business: ask the experts. Contact us today for an IT assessment!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/09/the-difference-between-groups-yammer-and-teams/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 04 Sep 2020 02:45:37 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/the-difference-between-groups-yammer-and-teams</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Choosing the best MSP for your business</title>
      <link>https://www.emdnet.com/choosing-the-best-msp-for-your-business</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+11.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           MSPs defined
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           MSPs are companies composed of specialists from various IT fields. They deliver various IT services (e.g., cloud computing, cybersecurity, backup and disaster recovery) and proactively manage their clients’ IT systems under a subscription model.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Selecting the best MSP
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While there are many MSPs out there, not all of them are equipped to meet your company’s unique needs. You can only achieve optimum IT results by selecting the right MSP.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Keep in mind these criteria when choosing an MSP:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Depth of skills and experience
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – Any MSP should have the skills and experience that go beyond basic software installation, maintenance, and upgrades. They should also have strong expertise in advanced IT functions, such as database management, cloud technology, security, and cross-platform integration, so they can keep up with your company’s growing IT requirements.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Financial stability
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – With IT being the backbone of your business operations, you need an IT partner who will be there for the long haul. Assess their stability by looking into their annual reports and financial statements. Check how many clients they have and their customer retention numbers. Also ask the MSP to provide customer references and testimonials.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Competitive service level agreement (SLA)
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – An SLA is a contract that dictates the standards that your MSP should be able to meet. It should be able to answer these questions: Do they offer 24/7 support? Can they conduct remote and on-site support? What is their guaranteed response and resolution times? If they fail to meet their committed service levels, are there corresponding rebates or penalties.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Third-party vendor partnerships
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – Pick an MSP with an ongoing relationship with the technology vendors (e.g., Microsoft, Oracle, Salesforce) whose products you already use in your IT environment. What type of partnership does the MSP have with those vendors? The higher the partnership level, the more vendor certifications the provider has, which means they can bring a lot of expertise to your business.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Choosing the right provider is a very important step that will impact on the performance and success of your business. If you want to learn how MSPs can support your business, contact us today.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Published with permission from TechAdvisory.org. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/strong&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/08/choosing-the-best-msp-for-your-business-2/" target="_blank"&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Source.
           &#xD;
      &lt;/strong&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 31 Aug 2020 02:47:39 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/choosing-the-best-msp-for-your-business</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Distributed spam distraction hides illegal activities</title>
      <link>https://www.emdnet.com/distributed-spam-distraction-hides-illegal-activities</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+13.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is DSD?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           DSD is a type of attack wherein cybercriminals inundate email inboxes with as many as 60,000 spam emails. These emails don’t contain dangerous links, ads, or attachments, just random excerpts of text taken from books and websites. But because of the sheer volume of these emails, deleting and blocking each one of them can be daunting. And worse, the email and IP addresses used to send them are all different, so victims can’t simply block a specific sender.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While these spam messages may seem like harmless annoyances, their true purpose is to draw victims’ attention away from what hackers are doing behind the scenes — which is to steal and use your personally identifiable information to conduct a raft of illegal activities. These include stealing money from your bank account or making unauthorized purchases in your name. In a DSD attack, the thousands of spam emails you get serve as a smokescreen that hides payment confirmation messages.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           New tactics
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Over the years, hackers have developed new DSD tactics. Several reports show that instead of nonsensical emails, hackers are using automated software to have their targets sign up for thousands of free accounts and newsletters to distract them with authentic messages. This allows DSD blasts to slip past spam filters that weed out the malicious code and text used in traditional DSD attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Also, anyone can go on the dark web and pay for DSD services. For as little as $40, you can get a hacker to send out 20,000 spam emails to a specific target. All you need to do is provide the hacker with your target’s name, email address, and credit card number — all of which can also be purchased on the dark web.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How to protect yourself from DSD
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           DSD is a clear sign that your account has been hijacked, so whenever you receive dozens of emails in quick succession, contact your bank to cancel any unfamiliar transactions and change your login credentials as soon as possible. Also, you should update your anti-spam software (or get one if you don’t have one) to protect your inbox from future DSD attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Hackers only initiate DSD attacks after they’ve obtained their target’s email address and personal information, so make sure your accounts and identity are well protected online. You should regularly change your passwords and PINs, enable multifactor authentication, set up SMS and/or email alerts for whenever online purchases are made in your name, and be careful about sharing personal information with others.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           DSD is just one of many cyberthreats out there. For expert advice on how to ensure your safety and security online, get in touch with our team of IT professionals.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/08/distributed-spam-distraction-hides-illegal-activities/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 26 Aug 2020 02:54:26 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/distributed-spam-distraction-hides-illegal-activities</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>3 Disaster recovery myths, debunked</title>
      <link>https://www.emdnet.com/3-disaster-recovery-myths-debunked</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+14.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Myth 1: Tape backups are the best DR solution
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Tape backups are physical objects that deteriorate over time. Try listening to a cassette tape from the ’90s. Its sound may be distorted already, or it probably doesn’t work at all. Similarly, your tape backups will start to fail as years pass. At first, only a few files will be affected, but you may gradually lose all your data.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It is also a common practice to store another set of tape backups outside your premises so that they will be safe in case a natural disaster befalls your office. However, if your storage spaces themselves are unsafe from natural disasters, this could pose a problem.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Unlike tape backups, cloud-based backups are safe from deterioration. They are also stored in multiple secured locations that are protected from natural disasters. This means your data backups are as safe as they can be.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What’s more, cloud-based backups save you time in several ways. Data is automatically backed up online, so you don’t need to manually copy information onto your tapes. You also won’t need to manage boxes of tapes, freeing you to focus on your assigned tasks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Myth 2: The RTOs you want are too expensive
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Essential to any DR plan are recovery time objectives (RTOs), or the ideal length of time needed to get everything up and running again to avoid serious losses. Before the cloud, a “swift” recovery time would take days and cost up to six figures.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cloud and virtualization solutions have made this much more affordable and faster than ever before. Most DR providers can back up your critical data in an hour or two. And if you ever need to recover data, most services can do so in less than a day.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Myth 3: Disaster recovery is for big businesses, not SMBs
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Because of the astronomical costs previously associated with DR, only big businesses could afford backup and recovery solutions. But now, the cloud has made these valuable services affordable for small- and medium-sized businesses (SMBs). From dental offices to small retail operations, SMBs can now take advantage of the best DR solutions in the market. Advances in IT and the cloud have also eliminated the obstacles of complexity, costs, and insufficient IT resources.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We hope that by dispelling these myths, you’d be convinced to implement a disaster recovery plan (DRP) for your business. Not only is a DRP necessary to your business continuity, having one is also more affordable and efficient than ever. If you’d like to learn how our disaster recovery solutions can safeguard your business, send us a message and we’ll fill you in.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/08/3-disaster-recovery-myths-debunked/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 12 Aug 2020 02:56:42 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/3-disaster-recovery-myths-debunked</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Reasons you should switch to the new Microsoft Edge</title>
      <link>https://www.emdnet.com/reasons-you-should-switch-to-the-new-microsoft-edge</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+15.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Microsoft has just leveled the playing field for web browsers by bringing major changes to Microsoft Edge. The internet browser’s stunning new features help users stay organized and save time as well as protect their online data and identity. If you haven’t tried the upgraded browser yet, now is a great time to check it out.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Collections
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Collections allows you to gather information from different sites, then organize, export, or return to it at a later time. Doing these can be especially difficult if you’re working across several sites and multiple devices.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To use this feature, simply click on the Collections button and a pane will open on the right side of your browser window. Here, you can easily drag and drop web pages, text, images, videos, and other elements into a group, which you can then import to a Word document or Excel workbook.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Vertical tabs
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Vertical tabs are a handy feature if you often find yourself opening dozens of tabs at once at any given time. Instead of having to hover over or click on one to see which page it’s on, you can easily find and manage your tabs on the side with a single click. You’ll never have to lose track of or accidentally close tabs again.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Smart Copy
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How often do you copy content from the web and paste it into a document only for it to become an ugly mess of text that needs to be cleaned up? This won’t be a problem if you use the new Microsoft Edge. The Smart Copy feature makes it easier to select, copy, and paste web content — including any images or links — while preserving its formatting.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Tracking prevention
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Whenever you visit a site, online trackers can collect information about your internet activity, including pages you visit, links you click on, your search history, and more. What’s alarming is that they can do this even when you’re not on the site. Companies then use the data collected to target you with personalized advertisements and experiences. This can seem highly intrusive, if not downright creepy.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The new tracking prevention feature in Microsoft Edge is designed to keep you from being tracked by sites that you aren’t accessing directly. It’s enabled by default, and it gives you control over the types of third-party trackers to be detected and blocked, thereby enhancing your online privacy.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5. Password Monitor
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Millions of online personal credentials are frequently exposed due to data breaches and sold on the dark web. To keep your online accounts safe from hackers, Microsoft developed the Password Monitor. When enabled, this feature notifies you if the credentials you’ve saved to autofill is on the dark web. It then prompts you to take action, allowing you to view a list of all the leaked credentials and then leading you to the respective site to change your password.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           6. InPrivate mode enhancements
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Sometimes, you may want extra online privacy when browsing the internet, especially if you’re sharing devices with other people. When you use the InPrivate mode, your history, cookies, and site data are automatically deleted once you finish a web browsing session. What’s more, your searches aren’t tied to your account, so you don’t have to go through the hassle of deleting your search or browser history.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           7. Immersive Reader
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Built into the new Microsoft Edge, Immersive Reader makes reading online easier and more accessible by removing distractions on the page and creating a simplified environment that helps you to focus. This feature also gives you access to a variety of capabilities, including hearing text read aloud or adjusting the text size.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           8. 4K and Dolby Audio
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you enjoy binge-watching the latest series on Netflix or just want a high-definition entertainment experience when viewing content online, then this feature is for you. Microsoft Edge is the only browser on Windows 10 that lets you watch Netflix in stunning 4K resolution and supports Dolby Audio and Dolby Vision.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           9. Give with Bing
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Bing now comes with a Give Mode feature that allows you to support the causes you care about by simply searching using the search engine. As part of the Microsoft Rewards program, you can earn reward points for searches and donate these points to one out of more than a million nonprofits to choose from. This includes the CDC Foundation and other organizations supporting the COVID-19 response.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           10. Easy switching
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft Edge is 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.microsoft.com/en-us/edge" target="_blank"&gt;&#xD;
      
           available to download
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            for Windows, Mac, iOS, and Android. What’s great is that you can easily copy or migrate your bookmarks, form fill information, passwords, and basic settings to the new Microsoft Edge with just a single click.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you want to learn more about the latest features of Microsoft Edge and how to enjoy these benefits on your business computers, give us a call today.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/08/reasons-you-should-switch-to-the-new-microsoft-edge/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 10 Aug 2020 03:02:23 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/reasons-you-should-switch-to-the-new-microsoft-edge</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Your password may not be secure — update it now</title>
      <link>https://www.emdnet.com/your-password-may-not-be-secure-update-it-now</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+16.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The problem
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The issue isn’t that the NIST advised people to create easy-to-crack passwords, but their previous advice inadvertently made people create weak passwords using predictable capitalization, special characters, and numbers, like “P@ssW0rd1.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Such a password may seem secure, but the strings of characters and numbers could easily be compromised by hackers using common algorithms.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What’s more, the NIST also recommended that people change their passwords regularly, but did not specify how and when to change them. Since many people thought their passwords were already secure because they’ve included special characters in them, most only added or changed one character.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The NIST essentially forced everyone to use passwords that are hard for humans to remember but easy for a hacker’s algorithm to crack.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Eventually, the institution admitted that this can cause more problems than solutions. It has reversed its stance on organizational password management requirements, and is now recommending banishing forced periodic password changes and getting rid of complexity requirements.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The solution
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Security consultant Frank Abagnale and Chief Hacking Officer for 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://knowbe4.com/" target="_blank"&gt;&#xD;
      
           KnowBe4
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            Kevin Mitnick both see a future without passwords. Both security experts advise enterprises to implement multifactor authentication in login policies.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
          This requires a user to present two valid credentials aside from a password to gain access to an account. This could be a code sent to the account owner’s smartphone, a login prompt on a mobile device, or a facial or a fingerprint scan. This way, hackers’ login efforts are futile unless they fulfill the succeeding security requirements.
         &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
          Moreover, Mitnick recommended implementing long passphrases of 25 characters or more, such as “recedemarmaladecrockplacate” or “cavalryfigurineunderdoneexalted.” These are much more difficult to guess and less prone to hacking. As for the frequency of changing passphrases, it will depend on a company’s risk tolerance.
         &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
          Simply put, passwords should be longer and include nonsensical phrases and English words that make it almost impossible for an automated system to crack.
         &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
          You should also enforce the following security solutions within your company:
         &#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Single sign-on
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – allows users to securely access multiple accounts with one set of credentials
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Account monitoring tools
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – recognizes suspicious activity and locks out hackers
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When it comes to security, ignorance is your business’s kryptonite. If you’d like to learn about what else you can do to remain secure, just give us a call.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/08/your-password-may-not-be-secure-update-it-now/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 07 Aug 2020 03:04:49 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/your-password-may-not-be-secure-update-it-now</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Make the most out of Outlook with these tips</title>
      <link>https://www.emdnet.com/make-the-most-out-of-outlook-with-these-tips</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+17.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Organize your inbox
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Is your Outlook inbox getting a little too cluttered for your liking? Use the Clean Up feature to tidy up your inbox.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           From your inbox, click the Home tab and choose from one of three Clean Up options:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Clean Up Conversation
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – reviews an email thread or a conversation and deletes redundant messages
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Clean Up Folder
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – reviews conversations in a selected folder and deletes redundant messages
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Clean Up Folder &amp;amp; Subfolders
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – reviews all messages in a selected folder and any subfolders, and deletes redundant messages in all of them
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ignore conversations
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Besides redundant messages, group conversations that aren’t relevant to you can clutter up your inbox. The Ignore button helps you organize your inbox and focus on relevant emails.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To activate this feature, select a message, then click Home &amp;gt; Ignore &amp;gt; Ignore Conversation. You can also do this by opening a message in a new window and clicking Ignore under the Delete function. You can easily revert this action by going to the Deleted Items folder and clicking Ignore &amp;gt; Stop Ignoring Conversation.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Send links to files
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This function is especially useful when you need to send large files to your coworkers or clients. You can send a link to the file instead of the file itself as well as set permissions to allow recipients to edit and collaborate on linked files in real time.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To do this, upload the file you wish to send to OneDrive. Then from the message box, click Attach File &amp;gt; Browse web locations &amp;gt; OneDrive.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Schedule a Teams meeting
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Teams is Microsoft’s unified communication and collaboration platform, and it includes the Outlook add-in. This feature allows you to set up Teams meetings directly from Outlook. It also lets you view, accept, or join meetings in either app.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To schedule a Teams meeting on Outlook, follow these steps:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Switch to the calendar view on Outlook. Click the New Teams Meeting tab.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Add individual participants or entire contact groups to the Required or Optional fields.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Type in the topic, start time, and end time of the meeting. There’s no need to add the dial-in phone numbers and conferencing IDs to the invite, as Outlook does this automatically for you.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Create a message inviting the recipients to the meeting, then click Send.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Tag contacts
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To get the attention of a specific person in a group email or meeting invite, use the @Mention function. This works particularly well for emails sent to multiple recipients or if you want to convey the urgency of your message.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In the body of your email or invite message, type the @ symbol followed by the name of the person you want to tag (e.g., @johndoe). Doing so will highlight the name in the message and automatically add it to the To line of your message.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You can also search for messages you’re tagged in by selecting Filter Email from the Home tab, and then clicking Mentioned.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           These are just some of the things you can do to improve your Outlook experience. For more on how to get the most out of Outlook and other Microsoft products, drop us a line today.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/07/make-the-most-out-of-outlook-with-these-tips/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 29 Jul 2020 03:08:49 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/make-the-most-out-of-outlook-with-these-tips</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Unpleasant-looking website elements you need to fix</title>
      <link>https://www.emdnet.com/unpleasant-looking-website-elements-you-need-to-fix</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+18.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Making a beautiful website is not just about aesthetics. It’s also about giving your site visitors and customers a great user experience while they browse your products and services. This is especially important now that people spend way more time browsing and shopping online than ever before. To keep your site aesthetically appealing and easy to use, consider enhancing these elements.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A variety of professional photos
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           From pictures of your products to team photos, high-quality images are arguably the most important thing on your website. Blurry, outdated, or irrelevant pictures tell your site visitors that you don’t care about their browsing experience. In-house photos are the best option, but stock images shouldn’t cause any problems as long as they are optimized for mobile viewing and relevant to your content.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Navigation
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Aside from subpar images, linking to nonexistent pages is one of the best ways to turn site visitors away. Make sure it’s easy to navigate your site and remove outdated or irrelevant pages. You can’t sell 404 pages to customers, and if that’s all visitors can find, it’s game over.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Clear copywriting
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The last thing you want to do is to confuse your customers, so it’s important to keep all of your product or service descriptions as straightforward and simple as possible. If what you’re selling has detailed information such as dimensions or technical requirements, make sure the description is easy to find but not obtrusive.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Promises to site visitors
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Any website that ships products should make its returns policy as visible as possible. This establishes trust early. Explicitly stating terms of return is also important because some online shoppers make purchase decisions based solely on the clarity of a return policy.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Even if you don’t run an eCommerce site, you also need to prominently display privacy commitments, such as those mandated by the European Union’s General Data Protection Regulation (GDPR).
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About page
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Your brand needs a story behind it that customers can relate to. Every company website should have an About Us page that describes your team, its culture, and what sets you apart from the competition. Whatever your story is, make sure it’s accessible from any page on your site.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Design
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Not everyone is a web design expert, but in today’s gig economy, one is never too far away from such a career. If your budget is tight, there are DIY site builders specifically geared toward small businesses. Or with a relatively low monthly expenditure, you can hire a managed website provider.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With more revenue originating online, small- and medium-sized business owners can’t afford to overlook the importance of creating a fully functional website.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For more information on building a modern website, call us today!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/07/unpleasant-looking-website-elements-you-need-to-fix/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 24 Jul 2020 03:13:37 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/unpleasant-looking-website-elements-you-need-to-fix</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Speed up your Windows 10 PC with these tips</title>
      <link>https://www.emdnet.com/speed-up-your-windows-10-pc-with-these-tips</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+19.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When your computer shows signs of slowing down, don’t feel compelled to buy a replacement just yet. You can still speed up your machine — and do it for free, too. We’ve listed four effective tips to make your Windows 10 computer faster:
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
         This is a subtitle for your new post
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows makes certain programs readily available by loading them at startup. While Microsoft likely has good intentions for doing this, this auto-launch feature slows down your computer. To fix this issue, you’ll need to adjust your settings.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Open the Task Manager by pressing Ctrl+Shift+Esc to see the programs that launch during startup. On the startup tab, you can easily disable any programs you don’t want launching at startup, such as media players and optional accessories that don’t have to be active all the time. But to be on the safe side, keep essential apps, such as antivirus software, enabled.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Get rid of useless applications
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Having too many programs installed on your computer uses up valuable memory and hard disk space. This slows down your computer and makes the machine work harder than necessary. Quickly uninstall programs you don’t need by following these steps:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Tap the Windows key on your keyboard and type “Add or remove programs” (this will show you all the apps stored in your computer).
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            A link to the system settings will appear. Click on the link.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Select the program/s you no longer want, and click Uninstall.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Once you do this, you’ll then be guided through several steps to complete the uninstallation process.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Organize your disks
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It’s important to regularly clean out your computer of data you don’t need. Thankfully, Microsoft’s Disk Cleanup tool makes it easy to do so.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To find the tool, tap on the Windows button on your keyboard and type “Disk Cleanup.” If you click on the link, the tool will automatically find files that take up too much memory space, such as temporary Internet and system memory dump files. Just click OK to send these files to your Recycle Bin.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Turn off apps running in the background
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You may not know it, but there are a lot of programs running in the background as you use your computer. Microsoft enabled their native universal apps to do this so you can quickly access their features. However, this also slows down your CPU. Disabling them will reduce the burden on your computer and speed it up.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To find out what programs are running in the background, press the Windows button on your keyboard and type “Background apps.” Find the programs you don’t need running and toggle the On-Off button.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           By following these four steps, you’ll see a noticeable difference in the speed of your PC. If you want to learn how to optimize your Windows system further or need assistance with your other Microsoft products, give us a call.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/07/speed-up-your-windows-10-pc-with-these-tips/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 22 Jul 2020 03:17:04 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/speed-up-your-windows-10-pc-with-these-tips</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Top tips for making your website look awesome</title>
      <link>https://www.emdnet.com/top-tips-for-making-your-website-look-awesome</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+20.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Make a statement with professional photographs
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Before site visitors read what’s on your website, they assess it by checking out your images. A picture is indeed worth a thousand words, but are those words truly what you want to convey to your audience?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Blurry, outdated, or irrelevant pictures tell your site visitors that you don’t care about their browsing experience. In-house photos are the best option, but stock images shouldn’t cause any problems as long as they are optimized for mobile viewing and relevant to your content.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Help visitors find what they want with search tools
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If your set of offerings is not expansive, a simple navigation menu ought to help visitors find what they need. However, the deeper your catalog gets, the more you’ll need additional tools. One way is to affix a search bar in your header so that people can use keywords to scour your site. Another way is to engage visitors via chat. You can preprogram a chatbot to ask questions that narrow down a visitor’s intention, or you can have a live agent address a visitor’s concerns in real time.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The more helpful your website is, the more it will foster trust in your brand and make visitors more likely to do business with you.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Extra tip:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Reduce the number of clicks a visitor has to make to achieve their objectives. For instance, eschew using the “Read more” link on product descriptions on product details pages. Visitors dive into a product page because they’re interested in fully learning more about the product, and the “Read more” link just hinders them from doing so.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Present your case clearly with good copywriting
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The last thing you want to do is to confuse and frustrate your customers, so it’s important to keep all of your product or service descriptions as straightforward and simple as possible. If what you’re selling has detailed information, such as dimensions or technical requirements, make sure that they’re easy to read and are typed out.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Don’t use screenshots of information tables because web visitors compare offerings by collating information from different sellers. If your information is displayed in the form of an image, you’ll force users to type the info themselves. You’ll immediately lose the ones who don’t want that sort of hassle.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Let visitors get to know your company better in the About Us page
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Your brand needs a story behind it that customers can relate to. Every company website should have an About Us page that describes your team, your company culture, and what sets you apart from the competition. Whatever your story is, make sure it’s accessible from any page on your site.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Hire a professional web designer
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If your budget is tight, there are DIY site builders specifically geared toward small businesses. Or for a relatively low monthly fee, you can hire a managed website provider. A website provider will take care of:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Form
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            – They’ll make your site look impressive on any screen size.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Function
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            – The provider will ensure that your site is easy to use and works as expected, whether you’re using a keypad and mouse or just your finger or stylus.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Fixes
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            – If something in your site is broken or you want to make changes to it (such as integrating an appointment scheduling app), they will handle it for you.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With more revenue originating online, small- and medium-sized business owners can’t afford to overlook the importance of creating a fully functional website. For more information on building a modern website, call us today!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/07/top-tips-for-making-your-website-look-awesome/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 03 Jul 2020 03:20:09 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/top-tips-for-making-your-website-look-awesome</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Turn off invasive Windows 10 settings in four steps</title>
      <link>https://www.emdnet.com/turn-off-invasive-windows-10-settings-in-four-steps</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+21.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Windows 10 has become the operating system (OS) of choice among business and personal users. Despite the many improvements to the OS that Microsoft has rolled out, Windows 10 isn’t perfect. In fact, many users have complained about its intrusive default privacy settings. Luckily, you can easily turn these settings off to ensure your privacy.
            &#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Turn off personalized advertising
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows 10 assigns each user an advertising ID to personalize their ad experience based on their recent browser history. You can turn off the advertising ID feature by doing the following:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Click Start &amp;gt; Settings &amp;gt; Privacy &amp;gt; General.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Toggle off the option “Let apps use my advertising ID for experiences across apps.” This will reset your advertising ID.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If you don’t want to receive locally relevant content from websites, toggle off the option “Let websites provide locally relevant content by accessing my language list.”
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Disable Cortana
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft has ventured into the market of voice-controlled virtual assistants with Cortana. This personal assistant allows users to set reminders, schedule events, and send emails, among other tasks. Every time you use Cortana, it collects information about your computer activity — “learning” it, so to speak — to improve user experience. But if you find this feature intrusive, you can disable Cortana completely with these steps:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Search for the Windows Registry editor in the Windows search bar, or press Windows + R, type “regedit,” and click OK.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Copy and paste HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows into the address bar at the top.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Look for the Windows Search folder. If it doesn’t exist, create it by right-clicking the right-hand pane, then choose New &amp;gt; Key. Rename the folder “Windows Search”.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Select the Windows Search folder, then right-click the right-hand pane and select New &amp;gt; DWORD (32-bit) Value.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Name it “Allow Cortana,” and make sure the Value Data is set to zero.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Restart your computer.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Stop peer-to-peer (P2P) file sharing
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows 10’s P2P file sharing feature enables your PC to share downloaded updates with other Windows 10 users by default. This helps other users update their systems faster and speeds up your upgrade downloads. To turn it off, do the following:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Go to Settings &amp;gt; Update and Security &amp;gt; Windows Update &amp;gt; Advanced Options &amp;gt; Choose how updates are delivered.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Note that the default setting is “Updates from more than one place.” If you want to disable this feature entirely, toggle off this option. If you want to share your files with PCs on your home network, leave this feature on and select PCs on my local network.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Change Microsoft’s Edge settings
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft’s relaunched browser is chock-full of features, such as web experience personalization and typing prediction. Such features may make you uncomfortable since they all send back data to Microsoft. Here’s how to turn them off:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Open Edge and click on the menu icon (three dots) in the upper right corner.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Next, click on Settings &amp;gt; Privacy and services. Scroll down and switch on the “Send ‘Do Not Track’ requests” option.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           There’s also a bunch of privacy and services settings that you may want to disable, such as tracking services, navigation error resolution, block potentially unwanted apps, and more.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For more tips on keeping Microsoft from tracking your online activity and more information about how to safeguard your security and privacy, drop us a line today. Our experts will be more than happy to help!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/07/turn-off-invasive-windows-10-settings-in-four-steps/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 01 Jul 2020 03:41:38 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/turn-off-invasive-windows-10-settings-in-four-steps</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Microsoft 365 update channels: What you need to know</title>
      <link>https://www.emdnet.com/microsoft-365-update-channels-what-you-need-to-know</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+27.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Many businesses using Microsoft 365 prefer to have the latest versions of the productivity suite's applications. Some businesses prefer to get updates as soon as they become available, while others prefer to update their systems on a predictable schedule. Fortunately, Microsoft’s update channels enable businesses to customize when they receive apps’ new features.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           New update channel: Microsoft Enterprise Channel
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The new Microsoft Enterprise Channel is for organizations that prefer to get updates on a predictable schedule. With this update channel, users can receive new features and patches on the second Tuesday of every month, which Microsoft famously calls Patch Tuesdays.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This update channel is ideal for companies with IT departments that want to reduce the burden of updating systems at irregular intervals. This will allow them to have a fixed schedule of downloading the latest productivity features, system improvements, and essential security patches.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Recommended update channel: Current Channel
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Current Channel is great for companies that want to receive feature updates as soon as they become available. New Office features are released at least two or three times a month, so those that choose Current Channel will get them immediately.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The same applies to non-security updates such as reliability and performance improvements, which are also released two to three times a month. As standard, security updates will be released on Patch Tuesdays, and are therefore released on a fixed schedule.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Those who are only about to install Microsoft 365 apps will be on Current Channel by default. That means they’ll get feature updates, security updates, quality updates, and bug fixes whenever they’re ready, and can expect to receive two to three updates every month.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Option for less frequent updates: Semi-Annual Enterprise Channel
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This option is for organizations that require a longer period to receive new features. This especially applies to those that use devices that must undergo extensive testing before receiving new features, perhaps to comply with governmental and regulatory authorities or for other unique reasons.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Under this update channel, organizations receive feature updates twice annually: in January and July, on the second Tuesday of the month. Security updates are still sent once a month, on Patch Tuesdays, similar to Microsoft Enterprise Channel and Current Channel.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Updates to existing update channels
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Another important change is the new names of the Microsoft 365 update channels. Organizations can choose from the following options: Current, Monthly, or Semi-Annual (formerly Insider, Monthly, and Semi-Annual). In addition, testing channels previously labeled Targeted have been renamed Preview.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It’s important to select the right update channel for your organization to keep system updates streamlined and IT workflows uninterrupted. Choosing an update channel also depends on the user preferences of your business — whether they’d rather use the latest versions of their apps or would be fine to wait — as well as your business’s rules on compliance.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To learn more about Microsoft’s update channels, specifically, how to know which one’s best for your company and how to optimize your productivity apps, call our IT and software experts today.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/05/microsoft-365-update-channels-what-you-need-to-know/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 29 May 2020 03:58:51 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/microsoft-365-update-channels-what-you-need-to-know</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>How to protect your business printers from hackers</title>
      <link>https://www.emdnet.com/how-to-protect-your-business-printers-from-hackers</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+30.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Organizations spend resources on keeping their technology and devices secure, but they often overlook one crucial piece of hardware: printers. Printers, just like computers and Wi-Fi networks, can be an entry point for hackers and a gateway to your business’s sensitive information. Here’s what you need to know about keeping your printers secure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What makes business printers vulnerable to cyberattacks?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When assessing network security threats, companies primarily focus on servers and computers not only because they are the most exposed to external threats, but also because they get the bulk of cyberattacks. Printers are often at the bottom of the list since they are not prime targets. What’s more, their functions seem to be internal at first glance, as they don’t interact with external systems.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           But it’s exactly because of their primary functions, namely printing and scanning, that make print devices perfect cybercriminal targets. Businesses run important documents such as tax forms, employee information, medical records, and financial statements through print devices, and hackers would definitely love to get their hands on them.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           And they can — easily.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Network printers store previous print jobs in their hard drive, sometimes including those that have been canceled. If anyone accesses the printer — even remotely — they may be able to see those documents by hacking into the printer using a specialized tool.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Files can also be intercepted during wireless transmission, as modern printers can now be connected to the web. Not only can hackers exploit printers’ open network ports to view data, but they can also take over vulnerable printers and transmit their own data through the machine.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What can you do to protect your business printers?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Business printers should not be disregarded when planning a cybersecurity strategy. Keep your print devices secure by following these best practices:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Monitor your network continuously and promptly install printer software updates and patches. Printer manufacturers often release software support or updates, so regularly check for those.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Change the default password and administrator login credentials of printers with web management capabilities.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Only allow company-owned devices to connect to your printers.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Always connect to your printers using secure connections. Conversely, avoid accessing your printers through a public internet connection.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Restrict printer access by using a firewall.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If your wireless printer has the feature that requires users to enter a PIN before they can print documents, enable it to prevent unauthorized access.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If you don’t use your printer for fax and email, isolate your printer from your main company network and disable out-of-network printing.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If you handle classified data, do not connect your printer to any network. Instead, connect it directly to your computer using data cables, or print from a thumb drive.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Secure your printouts by enabling manual feed. This setting requires a user to manually input paper (or any material to be printed on), so there are reduced risks of the printed document getting stolen or being left in the printing area.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Another way to secure your printers is by partnering with an IT company that can take care of your printer-related worries. From thwarting attacks to reducing management costs to keeping your printer at optimal functionality, our experts can help.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Are you interested in learning more about cybersecurity? Call us today and discover how our wide array of tech services can safeguard your business.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/05/how-to-protect-your-business-printers-from-hackers/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 20 May 2020 04:13:43 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/how-to-protect-your-business-printers-from-hackers</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Should you monitor your employees’ online activities?</title>
      <link>https://www.emdnet.com/should-you-monitor-your-employees-online-activities</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+22.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To monitor or not to monitor — that is the question. Employee monitoring is a touchy subject. If you’ve ever considered it, then you may ask yourself if it is a good idea for an employer to check on their staff’s online activities. Below are the pros and cons of employee monitoring, and some helpful tips should you push through with it.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;h3&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The case for monitoring
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/h3&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Here are several reasons why monitoring your employees’ activities on company devices is a good idea. It can help you:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Protect your organization from data theft or harm
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – because careless or disgruntled employees may leak or steal your data.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ensure you have a harassment-free workplace
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – because cyberharassment (sexual or otherwise) happens among employees.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ensure members of your staff comply with policies
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – such as not downloading illegal programs or spending time on websites with illegal or hostile content.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Provide evidence in case of a lawsuit
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – should an employee participate in illegal activities using your business’s computers (heaven forbid!), monitoring their device can provide evidence of their involvement.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Sadly, many business owners who monitor their employees often discover that their staff members aren’t focused solely on the company’s success.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Arguments against employee monitoring
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Of course, you should also be aware of the potential downsides to monitoring. These include:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Productivity loss
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – monitoring can put a damper on employee morale, and you may see the distrust leading to productivity losses.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Lost privacy and lawsuits
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             – you’ll likely learn personal details about your employees that you would’ve never known about had you not monitored them. You may discover their political or religious views, sexual orientation, or medical problems. This subjects your business to potential privacy or discrimination issues if you or your management team acts negatively based on any of this information.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Monitoring guidelines to follow
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you decide to monitor your employees, here are a few tips you should follow.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Create written policies
           &#xD;
      &lt;br/&gt;&#xD;
      
           When you monitor your employees, ask yourself: “Am I doing this for security purposes? Is it to ensure my employees aren’t wasting time on games or social media?” If your monitoring policies are too strict, you could create an atmosphere of distrust.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Set guidelines for acceptable use of email and social media, web browsing, instant messaging, and downloading software and apps. Also, make sure to include how monitoring will be carried out and how data will be used, secured, and destroyed.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Tell your employees
           &#xD;
      &lt;br/&gt;&#xD;
      
           It’s important to inform your employees about the scope of your monitoring policies. If they find out you’re doing it secretly, you could face legal issues. By being transparent, you may actually see a boost in productivity by deterring employees from wasting time on the web.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When you tell your employees, explain why you’re doing it and the risks your business faces from misuse of digital assets. Reassure them you’re not doing it to spy on their personal life, but to create a compliant and law-abiding workplace. Because their activities will now be less private, encourage your staff to use their smartphones for personal matters. Also, provide your employees a copy of your written policy for them to read and sign.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Get the right technology tools
           &#xD;
      &lt;br/&gt;&#xD;
      
           You don’t need to know each and every employee activity, so look for apps and software that alert you of the most relevant problems, so you can focus on more important tasks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If implemented correctly, employee monitoring makes your business more secure and productive. For more information about security and other IT support tools, get in touch with us today.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/07/should-you-monitor-your-employees-online-activities/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 01 Jul 2002 03:44:19 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/should-you-monitor-your-employees-online-activities</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Microsoft 365 signals a new era of productivity for SMBs</title>
      <link>https://www.emdnet.com/microsoft-365-signals-a-new-era-of-productivity-for-smbs</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+23.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        
            In April 2020, Microsoft launched Microsoft 365, the successor to its popular Office 365. But it’s not a mere name change. The tech giant is also introducing improvements to its productivity software that will enhance how your business deals with cyberthreats every day.
            &#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Name change
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft has time and again shown that they are willing to make drastic changes to their products and services in the name of development. Their Windows 10 operating system (OS), for instance, is a far cry from its predecessor Windows 8. Microsoft made the jump from what they thought would be a revolutionary tile-based design in Windows 8 to a classic, ergonomically designed Windows 10.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The tech giant has once again made drastic changes, this time to their award-winning line of productivity apps Microsoft Office 365. O365, as it was lovingly referred to for nearly a decade, is now the sleeker, more powerful, Microsoft 365 Business.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft 365 Business is available to small- to mid-sized businesses (SMBs) on three different subscription plans: Business Basic, Business Standard, and Business Premium.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Available plans
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft 365 Business Basic
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft 365 Business Basic comes with many standard features, including web and mobile app access, full email and calendaring tools, secure file storage, collaboration tools, and support. Rest easy knowing that you have a powerful enterprise-grade software for a fraction of the cost such as:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Web and mobile app versions of Office apps
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Real-time coauthoring
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Email hosting with 50 GB capacity
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            1 TB of OneDrive storage
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Automatic syncs regardless of work platform choice (between OneDrive and SharePoint).
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Teleconferencing and unified communications via Microsoft Teams for up to 250 users
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Automatic threat defense via Exchange Online Protection
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            A complete array of cybersecurity tools and protocols, such as automated password policy tools
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft 365 Business Standard
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With the Microsoft 365 Business Standard plan, you’ll get everything Business Basic offers plus:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Desktop versions of Office apps for up to five PCs or Macs per user
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Easy and smart appointments management with Microsoft Bookings
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Real-time mileage tracking and reporting with MileIQ
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft 365 Business Premium
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft 365 Business Premium is the brand’s flagship plan, a great tool for businesses ready to take their operations to the next level. It comes with everything Business Standard offers plus:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Advanced security tools to protect from zero-day threats and ransomware, via Office 365 Advanced Threat Protection
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Remote wiping tools for stolen or lost devices, via Selective Wipe from Intune
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Restricted copying or saving options for unauthorized apps and locations
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Complete control of company data, via Information Rights Management
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Pre-breach threat resistance policy options, via Windows Defender Exploit Guard
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Malware protection, via Windows Defender
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Unlimited cloud archiving of emails, via Exchange Online Archiving
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Setup wizards for Windows 10, iOS, and Android
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Total security policy deployment — even for mobile apps — via Mobile Device Management from Intune
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           M
           &#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
      
           icrosoft 365 Business will change the way your staff powers your business. Contact us today to discuss how you can avail of a subscription
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/06/microsoft-365-signals-a-new-era-of-productivity-for-smbs/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 19 Jun 2002 03:46:50 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/microsoft-365-signals-a-new-era-of-productivity-for-smbs</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>How MSPs are supporting clients during the COVID-19 pandemic</title>
      <link>https://www.emdnet.com/how-msps-are-supporting-clients-during-the-covid-19-pandemic</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+24.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Providing infrastructure and service desk capabilities
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In today’s digital work landscape, MSPs are keeping their noses to the grindstone to fulfill customer demands and help keep businesses running. While many small companies have taken the first step of transitioning to remote work, they still need help managing the logistics.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Right now, MSPs are providing customers with IT infrastructures and taking on a host of network tasks, including configuring hardware, establishing remote connections, and managing backup and storage options, among other activities. These all help to ensure that company networks are reliable enough to facilitate a remote workforce.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           MSPs are also offering service desk capabilities, providing companies with a centralized resource for employees, customers, and business partners to answer questions, troubleshoot problems, and facilitate solutions. Appropriate and timely support is crucial, especially in times of great uncertainty.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Simplifying cloud adoption
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cloud solutions are ideal if IT environments must be quickly modified to meet changing demands or difficulties, which is why MSPs are now helping businesses leverage a variety of cloud technologies and even move their data and applications online.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           And because cloud migration can get complex, many MSPs are also offering managed migration plans that help companies transition key workflows and processes to the cloud safely and efficiently.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Offering remote support where possible
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The current travel restrictions and social distancing measures make work-related travel difficult and risky. And with highly distributed workforces, many companies would rather source local service technicians for break/fix assistance, cabling, and other IT solutions.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Partnering with MSPs ensures that systems and networks are protected all the time and critical support is provided within 24 hours. What’s even better is that some providers have technicians in different locations, making it easy to provide tools, resources, and support even in hard-to-reach areas.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Delivering flexible solutions
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As business needs continue to shift, MSPs must move in lockstep and provide support wherever they can. Here are some other ways MSPs are helping their clients navigate these trying times:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Assisting with IT projects
           &#xD;
      &lt;br/&gt;&#xD;
      
           Because of how broad and challenging IT projects can be, it’s not uncommon for companies to lack the right skills and resources to handle them. MSPs are helping them by providing the expertise and technologies needed to pursue these projects, allowing companies to keep moving forward.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Foregoing long-term contracts
           &#xD;
      &lt;br/&gt;&#xD;
      
           Some companies need IT support and services but can’t afford to commit to long-term contracts. Similarly, some want to augment their IT only for the duration of the COVID-19 pandemic. What's great is many MSPs are providing flexible IT solutions, giving customers all the services and support they need, when they need them.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Offering faster response times
           &#xD;
      &lt;br/&gt;&#xD;
      
           Especially now that downtime could likely spell the end of a business, companies seek quick turnaround times. Since MSPs typically offer 24/7 support and tout specialists with a wide range of experience and knowledge, they can proactively address issues and ensure that IT infrastructures are working as efficiently as possible.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Providing better customer service
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As many businesses are still adjusting to the new normal, providing positive customer experiences will go a long way to earning trust and ensuring customer loyalty post-crisis. By being compassionate and empathetic to the situations of their customers, MSPs are showing companies that they're navigating these trying times together.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Call our IT experts today to help configure the perfect remote work setup for your business.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/06/how-msps-are-supporting-clients-during-the-covid-19-pandemic/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Sat, 15 Jun 2002 03:49:27 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/how-msps-are-supporting-clients-during-the-covid-19-pandemic</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Why the latest Windows 10 update is blocked on some PCs</title>
      <link>https://www.emdnet.com/why-the-latest-windows-10-update-is-blocked-on-some-pcs</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+25.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Last week, Microsoft unveiled the May 2020 Update, which is the latest version of Windows 10. While some users are able to update their systems, some PCs are prevented from installing it. Here’s what’s causing the update block, and how you can bypass it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
         This is a subtitle for your new post
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The update block is present on devices such as the Surface Pro X and 7, Surface Laptop 3, and Surface Book 3, according to a test by 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.theverge.com/2020/6/1/21276653/microsoft-windows-10-may-2020-update-block-known-issues-list" target="_blank"&gt;&#xD;
      
           The Verge
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . The block is also present on other devices with the following configurations:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            PCs with games using GameInput Redistributable.
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             Installing the Windows 10 May 2020 Update on these systems may result in mouse input loss.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Always On, Always Connected PCs.
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             Devices with more than one Always On, Always Connected network adapter may experience unexpected restarts.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            PCs with integrated Intel graphics
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . Systems may encounter substandard variable refresh rates after installing the update.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Systems with Conexant or Synaptics audio drivers.
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             PCs may display a blue screen of death (BSOD) error message if the May 2020 Update is installed.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            PCs with older drivers for Nvidia display adapters.
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             Devices with GPU drivers with a version below 358.00 may encounter some performance issues.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Devices using Thunderbolt docks.
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             PCs may display a BSOD error message if the May 2020 Update is installed.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            PCs with certain Realtek drivers.
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             These Windows 10 devices may be unable to connect to more than one Bluetooth device.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft has also identified issues with the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://support.microsoft.com/en-ph/help/947821/fix-windows-update-errors-by-using-the-dism-or-system-update-readiness" target="_blank"&gt;&#xD;
      
           Deployment Image Servicing and Management (DISM)
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            service and 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://docs.microsoft.com/en-us/windows/win32/dxtecharts/installing-and-using-input-method-editors" target="_blank"&gt;&#xD;
      
           Input Method Editors (IME)
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            with the Windows 10 May 2020 Update.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If your PC has not yet received any update notification, or if you’ve checked for updates on Windows Update without any luck, it’s likely that your device is encountering issues with the May 2020 Update. As a result, Microsoft is only offering the update to compatible devices and currently resolving issues on other PCs.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How to bypass the update block
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If your device is currently blocked but you still want to install the May 2020 Update, you can get it through the Windows 10 Update Assistant. Here’s how to do it:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Go to the 
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://www.microsoft.com/en-us/software-download/windows10?ranMID=24542&amp;amp;ranEAID=nOD/rLJHOac&amp;amp;ranSiteID=nOD_rLJHOac-2heqn.fyGlRpDIL7HcVyQw&amp;amp;epi=nOD_rLJHOac-2heqn.fyGlRpDIL7HcVyQw&amp;amp;irgwc=1&amp;amp;OCID=AID2000142_aff_7593_1243925&amp;amp;tduid=%28ir__xt6davoomokftjqkxmlij6lydu2xnqtj3hcgf3yu00%29%287593%29%281243925%29%28nOD_rLJHOac-2heqn.fyGlRpDIL7HcVyQw%29%28%29&amp;amp;irclickid=_xt6davoomokftjqkxmlij6lydu2xnqtj3hcgf3yu00" target="_blank"&gt;&#xD;
        
            Windows 10 download page
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Under the header “Windows 10 May 2020 Update,” click on the Update now button and wait for a file to download.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Open the file. This will bring up the Windows 10 Update Assistant program.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The program will check for updates. Click on the Update now button once done.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The tool will check if your system meets the update requirements. Click Next.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Wait for the program to download and install the Windows 10 May 2020 Update.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You can also download Windows 10 through Microsoft’s 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://go.microsoft.com/fwlink/?LinkId=691209" target="_blank"&gt;&#xD;
      
           Media Creation tool
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            to use on another PC, burn to a DVD, or save to an external hard disk or thumb drive. We advise you take extra precautions, however, especially if Windows found potential compatibility problems with your system.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you want to learn more about the latest Windows 10 update and how to deploy it on your business PCs, give us a call today.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/06/why-the-latest-windows-10-update-is-blocked-on-some-pcs/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 12 Jun 2002 03:51:41 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/why-the-latest-windows-10-update-is-blocked-on-some-pcs</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Watch out for this Android malware</title>
      <link>https://www.emdnet.com/watch-out-for-this-android-malware</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+26.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is DEFENSOR ID?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           DEFENSOR ID is a banking Trojan that minimizes its malicious capabilities to sneak past security checks and infiltrate the Google Play Store. The malware’s primary function is to request access to an Android device’s Accessibility Service, which would allow hackers to execute a variety of commands.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For starters, if unwitting users grant access to DEFENSOR ID, the malware can observe any launched apps and send sensitive information back to hackers. This means hackers can steal anything from passwords and private emails to banking information and one-time SMS activation codes for two-step verification processes.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           DEFENSOR ID also allows hackers to remotely uninstall apps, launch programs, and perform gestures (e.g., tap, swipe, click) within the launched program. In theory, this feature can enable hackers to empty a victim’s bank account with minimal effort.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What’s more, the Trojan extends the lock screen timeout to 10 minutes so that cybercriminals have enough time to perform their malicious operations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Beware of apps leveraging Accessibility Services
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           According to researchers, DEFENSOR ID targeted Brazilian users and was downloaded over a dozen times. But despite its small success rate, it’s possible that more malware will leverage these techniques to steal sensitive information and control user devices. In fact, earlier in 2020, McAfee researchers discovered Android/LeifAccess malware that exploited Accessibility Services to leave fake reviews on the Google Play Store.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Plus, a common Android issue is that many independent software developers can upload their apps to the Google Play Store and easily circumvent security checks. So, if users aren’t thoroughly vetting the apps they download onto their devices, attacks similar to DEFENSOR ID will become more widespread.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Malware that can abuse Accessibility Services may even give rise to more deceptive online scams or massive-scale data breaches that can shut down businesses.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How to defend against DEFENSOR ID
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Developing a healthy skepticism of apps in the Google Play Store is the best way to prevent malware attacks like DEFENSOR ID. This involves training your staff to get in the habit of evaluating an app before downloading it. More specifically, they should be verifying whether user reviews seem authentic, checking the total ratings and downloads, and consulting with security experts whether an app is safe.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Businesses should also use endpoint security software to control what apps users can install on their company-registered devices. By limiting downloads to a few, fully verified apps, you can minimize your company’s exposure to mobile malware.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you want to keep your business safe from malware and other cyberthreats, it’s in your best interest to call cybersecurity experts like us. Not only do we provide top-notch security solutions, but we also offer proactive maintenance services to protect your IT at all times.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/06/watch-out-for-this-android-malware/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 10 Jun 2002 03:54:42 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/watch-out-for-this-android-malware</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Why your SMB needs a business continuity plan (BCP)</title>
      <link>https://www.emdnet.com/why-your-smb-needs-a-business-continuity-plan-bcp</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+28.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is a BCP?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A BCP is a predefined set of protocols on how your business should respond in the event of an emergency or natural disaster. It contains contingency plans for every aspect of your organization, including human resources, assets, and business processes.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Key threats to business continuity
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Various types of threats can affect SMBs such as:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Natural disasters – These are natural phenomena such as storms, earthquakes, and wildfires.
           &#xD;
      &lt;br/&gt;&#xD;
      
           Man-made disasters – These include cyberattacks, intentional sabotage, and human negligence.
           &#xD;
      &lt;br/&gt;&#xD;
      
           Equipment and utility failures – These include unexpected power failure, internet downtime, and disruption of communication services.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How to build an effective BCP
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If your organization does not have a BCP in place, now is a good time to put one together. These steps will help you formulate an effective BCP that will ensure your company keeps running even during a major crisis.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           #1 Business impact analysis (BIA)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A BIA will help you determine how a disruption can affect your company's current functions and processes, such as personnel, equipment, technology, and physical infrastructure. This step will help you calculate the potential financial and operational loss from each function and process affected.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           #2 Recovery options
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This step will help you identify key resources essential to returning your business to minimum operational levels. Some recovery options you can take include letting employees work from home or operating from a secondary location.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           #3 Plan development
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This step involves assembling your company's continuity team, which will be responsible for developing and implementing your BCP.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           #4 Testing and training
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Once your BCP is in place, your continuity team needs to perform regular tests to identify gaps and make necessary changes to ensure the plan’s effectiveness. They also need to conduct regular training for your employees so everyone knows their respective roles when a disaster strikes.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Having a foolproof BCP is a great way to ensure your business can quickly bounce back after a major disaster. If you're thinking about creating a BCP for your company but don't know where to start, give us a call today.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/05/why-your-smb-needs-a-business-continuity-plan-bcp/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Sat, 25 May 2002 04:02:46 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/why-your-smb-needs-a-business-continuity-plan-bcp</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>New Windows 10 update: Things you need to know</title>
      <link>https://www.emdnet.com/new-windows-10-update-things-you-need-to-know</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/a152a1dc/dms3rep/multi/blog+-+29.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The Windows 10 update will roll out on May 26–28, 2020 and will bring about a fresher look for the world’s most popular operating system. Aside from updates to Windows 10’s interface, here are some functionality improvements you can expect.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The update — named Windows 10 20H1/Windows 10 version 2004 — will feature some performance-enhancing upgrades and an initial rollout of new designs. These are aimed to unify Windows applications with those used on mobile devices and the like.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Fluent Design
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Fluent Design is an open-source, cross-platform design system that developers can use to craft multiple-device software and applications. Basically, it helps developers keep their application designs unified across several platforms while enhancing overall aesthetic and user experience.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In the upcoming OS update, users will experience some of the first native releases of Fluent Design-optimized applications, specifically Microsoft Office applications, Microsoft Store, Paint, and more. Expect to see refreshed icons and interfaces of your favorite Microsoft apps. Users will also notice that the new designs will stay uniform from platform to platform, whether they use it on a PC, Mac, or other operating systems.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cortana migration
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Users will also notice changes to the Start Menu — Cortana will no longer be docked to the start button, and the new design will feature new ways to interact with Microsoft’s digital assistant. Text-based chat interaction will now be available as well.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft is in the process of making Cortana into a personal productivity assistant for Microsoft 365 applications, so most of its new processing powers will revolve around improving the 365 experience for users. The update also brings about improved smart prompts that let the virtual assistant type out and send emails, adjust computer settings, open apps, and schedule events via voice commands.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows Search
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft is constantly finding ways to improve its Search tool for Windows 10. In this update, users will experience improved indexing and search speeds, as well as a smart indexing feature that limits activity to off-peak hours so that it doesn’t disrupt daily use. This will result in faster performance for laptops of all levels, especially those that still utilize HDD storage.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Where to download
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Users can download the feature update via Windows Update, a built-in tool in existing Windows 10 systems. You can access this by clicking Start &amp;gt; Settings &amp;gt; Windows Update. You can also type Windows Update on the search bar (beside the Windows button on the lower-left corner of the screen) and follow the easy instructions.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you opted for automatic updates, all you’ll have to do is sit back and wait. For manual updates, you’ll need to click on Check for Updates. Users can also get it through the Windows Insider Program. Simply go to Settings &amp;gt; Update &amp;amp; Security &amp;gt; Windows Insider Program and click on Get Started.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Call us today for all your Office 365 needs. We’ll help you get set up in no time.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Published with permission from TechAdvisory.org. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/05/new-windows-10-update-things-you-need-to-know/" target="_blank"&gt;&#xD;
      
           Source.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 22 May 2002 04:09:47 GMT</pubDate>
      <author>info@engageyourbiz.com (Engage Team)</author>
      <guid>https://www.emdnet.com/new-windows-10-update-things-you-need-to-know</guid>
      <g-custom:tags type="string" />
    </item>
  </channel>
</rss>
