Tech News Archives - Executech Wed, 08 Mar 2023 18:23:33 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://www.executech.com/wp-content/uploads/cropped-fav-150x150.png Tech News Archives - Executech 32 32 The 5 Biggest Tech Stories of 2019 According to Google https://www.executech.com/insights/top-5-tech-stories-2019/ https://www.executech.com/insights/top-5-tech-stories-2019/#respond Mon, 30 Dec 2019 00:00:00 +0000 https://www.executech.com/insights/top-5-tech-stories-2019/ In a few days, 2019 will come to a close, and we’ll start the beginning of a new decade in 2020. But a lot happened in tech this past year, and we wanted to take a little time before the year ends to review the biggest stories.  So, we scoured the top trending searches on […]

The post The 5 Biggest Tech Stories of 2019 According to Google appeared first on Executech.

]]>
In a few days, 2019 will come to a close, and we’ll start the beginning of a new decade in 2020. But a lot happened in tech this past year, and we wanted to take a little time before the year ends to review the biggest stories. 

So, we scoured the top trending searches on Google in 2019 to find tech, gadgets, and stories you all were most interested in. From a few tech blunders to exciting new horizons, here are the top tech stories of 2020!

1. Folding Phone Failure

folding phone

In April of this year, Samsung’s long-awaited leap into the future of folding phones came crashing down hard. As the tech giant unveiled its awe-inspiring Galaxy Fold and sent it to select reviewers, the phone didn’t quite hold up to the hype. 

Within days, many of the individuals set to review the product were experiencing problems. Although Samsung promised up to 200,000 folds before the phone would start to break down, reviewers were dealing with broken screens and units quite quickly after unboxing their units.  

Based on this unexpected initial blunder, Samsung decided to delay its 2,000 dollar folding phone. Originally slated to be released on April 26th, Samsung issued the following statement:

“We recently unveiled a completely new mobile category: a smartphone using multiple new technologies and materials to create a display that is flexible enough to fold. 

While many reviewers shared with us the vast potential they see, some also showed us how the device needs further improvements that could ensure the best possible user experience.

To fully evaluate this feedback and run further internal tests, we have decided to delay the release of the Galaxy Fold. We plan to announce the release date in the coming weeks.”

In July, the Galaxy fold finally got a new release date of September, but with one catch. The device would only be available in “select” regions. Well, here we are now at the end of 2019, and the Galaxy Fold is available to consumers, along with a few other foldable phone options, but the phone hasn’t quite caught on to mainstream use yet. 

We think we’ll see folding phones gain momentum in 2020, though, so get ready!

2. The Elusive Promise of 5G

Next on the list of Google’s trendiest searches of 2019 is all about 5G. We’ve all probably heard this elusive term because clearly, it’s big news. 

5G stands for fifth-generation cellular wireless, and it’s going to spur big changes in the way we use technology. However, for now, we’re still very much in the early days of 5G. 

All four major US carriers (AT&T, Verizon, Sprint, T-Mobile) have some form of 5G wireless. However, the technology is extremely limited in scope right now, only traveling about 800 feet from cell sites. So, although it seems we hear about 5G every day, there isn’t actually much coverage. 

There are a few phones that support some of the 5G systems being used in the US currently. However, if you want an all-band 5G phone, you’re going to have to wait because one hasn’t been released yet. 

Overall, there is a lot of hype around 5G, but right now, it’s still just a lot of talk from phone carriers. We probably won’t see the full potential of 5G for a year or two, but when it’s here, 5G will bring greater speed, lower latency, and the ability to connect a lot more devices at once. We can’t wait to see the effects of 5G!

3. Disney+ Signals the Beginning of the Streaming Wars

man holding tablet with streaming carrier logos

We’ve been watching Netflix, Hulu, HBO Go, and Amazon Prime Video for a while now. But when Disney+ launched in November, it signaled the beginning of a whole new slew of competition in the streaming space. Welcome to the streaming wars!

Netflix has dominated the streaming space, but competition is heating up, with Apple TV Plus and Disney+ already launched, and more coming in the early months of next year. And as Disney+ topped the list of Google searches in 2019, it’s clear that consumers are interested in other programming. 

In fact, just a day after the new streaming service launched on November 12th, it touted over 10 million subscribers. With the service only expected to reach around 8 million users seven weeks after the launch date, that’s pretty incredible. 

As even more rivals make their debut, it will be interesting to see how the streaming landscape changes. Netflix is betting big on original content to help keep its lead, with deals already in place with powerhouse media veterans. We’ll just have to keep tuning in to see who’s winning and losing (pun intended).

4. Equifax Data Breach Settlement 

The Equifax data breach was back in 2017. However, that didn’t stop it from making its way into the top ten most popular searches on Google in the news category. And there’s a good reason for that.

Up to 147 million individual’s data was exposed in the initial Equifax data breach, and Equifax settled with the Federal Trade Commission for $700 million. And $425 million of that is set to go to people affected by the data breach. 

The breach was a result of several inadequate cybersecurity protocols, as hackers were able to infiltrate Equifax’s systems and exfiltrate terabytes of data. The attackers used a web portal, targeting a vulnerability that many were already aware, but was never fixed. 

On top of that, systems weren’t correctly segmenting, meaning the criminals were able to move from the web portal to other systems, gaining access to names, birthdates, social security numbers, and more. 

And finally, Equifax had failed to renew an encryption certificate on one of their security tools, leading to the attackers being able to get their hands on the data. 

This breach and settlement is the perfect example of how much poor cybersecurity standards can cost your business

5. iPhone 11

hand holding iphone 11

And rounding out our list of the most googled tech stories of 2019 is the release of the iPhone 11. This new iPhone came with new colors, a dual-lens camera, improved durability, and a faster A13 chip. With these improvements, many were excited to get their hands on the new phone, especially considering the lower price tag than other iPhone options. 

For example, the iPhone 11 pricing started at $699, whereas the iPhone 11 Pro and iPhone 11 Pro Max started at $999 and $1099, respectively. One can only assume that this significant price difference is a reason for the increased interest in the iPhone 11. 

And this bodes well for Apple, as they have experienced less and less iPhone sales every year. Although we don’t know the exact number of iPhone 11 sales as Apple doesn’t release those anymore, it does look like the new phone’s sales have been doing well. 

There are rumors that Apple is going to release an iPhone SE 2 in the Spring, hoping to boost its sales even more. Only time will tell if we get to see another new iPhone in early 2020 or if we’re going to have to wait until September for an expected annual launch of the iPhone 12.

Stepping into 2020

So, those were some of the searches that users were Googling big time in 2019. We saw a lot of new gadgets with both successes and failures and some excitement for future technology. We can’t wait to see what tech 2020 brings, and with those last words in 2019, we’ll see you in the new year! 

The post The 5 Biggest Tech Stories of 2019 According to Google appeared first on Executech.

]]>
https://www.executech.com/insights/top-5-tech-stories-2019/feed/ 0
What is Azure? Microsoft’s Cloud Platform Explained https://www.executech.com/insights/what-is-microsoft-azure/ https://www.executech.com/insights/what-is-microsoft-azure/#respond Fri, 08 Nov 2019 00:00:00 +0000 https://www.executech.com/insights/what-is-microsoft-azure/ If you’ve been following the tech industry for a while, you’re probably extremely aware of the term “cloud computing.” A phrase that wasn’t even around fifty years ago has grown into the standard lingo of the tech world. And one of the biggest providers of cloud computing services is Microsoft, with its public cloud service- […]

The post What is Azure? Microsoft’s Cloud Platform Explained appeared first on Executech.

]]>
If you’ve been following the tech industry for a while, you’re probably extremely aware of the term “cloud computing.” A phrase that wasn’t even around fifty years ago has grown into the standard lingo of the tech world. And one of the biggest providers of cloud computing services is Microsoft, with its public cloud service- Azure. 

But, what is Azure, and what sets it apart from other cloud providers? Well, in this article, we are going to discuss the basics of cloud computing and Microsoft Azure, along with what you need to know about the service.

What is Azure?

First things first, let’s talk about what Microsoft Azure even is. Microsoft Azure is a cloud services platform. And, for those of us who aren’t as tech-savvy, you may be wondering, “What is a cloud services platform exactly?” Great question. A cloud services platform essentially gives individuals and businesses the ability to access off-site servers and data centers.

And, with Microsoft Azure, you have access to their robust data centers- that’s data centers across 54 regions worldwide and available in 140 countries– which allow you to build, deploy, and manage services and platforms from anywhere. So how does this all work?

How Do Cloud Services Work?

At this point, many of us have grasped the general concept of cloud technology. In fact, since the tech became mainstream, we often use the cloud in everyday life. From storing your photos and documents in the cloud to using cloud computing services, you’re probably familiar with cloud services like Google Docs and Dropbox. 

I mean, all the cloud really is, is the ability to save and store files somewhere other than your personal computer or network. Large companies like Microsoft, Google, and Apple all have massive data centers that allow users, like us, to save our files there. These centers help free up space on our computers and eliminate the need for individual companies to house their own data centers. But, what many of us don’t know is how it all works- especially cloud computing.

Think of cloud computing like this- as a business, you need computing power to run processes and functions for your business. This computing power requires a lot of equipment, space, money, and time. A cloud services provider functions just like a cloud file storage provider. But in addition to letting you store files on their hardware, they also allow you access to off-site computing power. 

With Microsoft Azure, you gain access to enormous data centers, applications, and programs all over the globe. And this infrastructure that is owned by Microsoft is much more expansive than what an individual business could house (or afford for that matter). And the best part is, Microsoft is in charge of the upkeep. When companies use a cloud provider, they don’t have to worry about maintaining or updating hardware at all. 

Why Should Business Move to the Cloud?

There are numerous benefits of moving to the cloud in general. First, cloud technology is scalable- meaning organizations only use the capacity they need. Before, organizations might have had to buy brand new hardware to handle seasonality changes or unexpected traffic increases. The cloud takes care of all of that, and you only pay for what you use.

The cloud is also extremely cost-effective. Instead of having to make substantial capital investments every few years in the form of new servers or other hardware, you pay a monthly rate based on the services you use. And you don’t have to pay for the maintenance, repairs, or power needed for on-premise hardware. You can sit back, relax, and spend your money on what really matters- improving your business.

Another significant benefit is the ability to drive innovative solutions quickly and efficiently. Organizations can deploy new products and applications in the cloud faster than old-school hardware would allow. With the ability to rapidly introduce new products means businesses can respond to competing products and make improvements based on customer feedback. 

And that’s not all. A few other notable benefits of cloud technology are:

  • Ability for disaster recovery
  • Increased collaboration
  • Flexibility to work from anywhere

It’s no wonder so many companies are choosing to move to the cloud with these benefits. But there is one thing that holds many businesses back from cloud migration. One common misconception is that the cloud isn’t as secure as on-site infrastructure. But, this simply isn’t true. 

Are Cloud Services Secure?

Cloud services are secure. Maybe even more so than on-premise hardware. Improved security is actually often thought of as an advantage of cloud technology over on-premise data centers.

The fact of the matter is that it isn’t where your data is located that makes it safe or not- it’s how your systems are built. And cloud providers have the experience of cybersecurity experts on their side. Reliable cloud providers (like Azure) invest heavily in digital and physical security measures- much more than most individual businesses could.

So, if you weren’t sold on the cloud before, take a moment to mull over those benefits. But, even if an organization has decided that moving to the cloud is the right move for them, they still have to answer the question of what provider to choose. There are many cloud providers available that will offer businesses significant advantages, so what sets Microsoft Azure apart?

Why Choose Azure?

There are several benefits Microsoft Azure’s cloud services network can offer individuals and businesses. The most significant advantage is that you gain access to seemingly limitless resources. Microsoft’s collection of data centers have capabilities, space, and programs that would be unavailable for an individual company to house on their own. Using Azure gives your business the power that you need to grow and expand. 

Secondarily, using Azure will save your company significant amounts of money. To create, manage, and house a personal data center is incredibly expensive. Even after dumping ridiculous amounts of money into your own data center, you’d still likely end up with sub-par capabilities.

By investing in Microsoft Azure, you’re able to eliminate the headache and financial worry of maintaining a data center. With Azure, you can free up your organization and staff to work on more critical projects and tasks than managing a data center.

Another area where Azure separates itself from other cloud service platforms is security. We’ve already discussed how cloud services are often no less secure than on-premise networks, but Azure takes it one step further. With Microsoft Azure, you’re able to move as many or as few services to the cloud as you like, allowing for a hybrid option. Creating a hybrid cloud is more difficult with other cloud providers when compared to Azure. And with a hybrid model, you can maintain complete control over the assets you choose. 

Azure For the Win

So, now you can answer the question, “What is Azure?” Cloud computing is the future of business. And Microsoft Azure is a powerful provider that offers numerous features, storage, and capabilities. You can read more about how Azure can transform organizations by reading this case study. In it, you’ll learn how a software company was able to overcome security issues, server locks, and data loss with Azure to regain their growth trajectory.

To learn more about cloud computing & backup, check out our Ultimate Guide To Cloud Computing!

The Ultimate Guide To Cloud Computing

The post What is Azure? Microsoft’s Cloud Platform Explained appeared first on Executech.

]]>
https://www.executech.com/insights/what-is-microsoft-azure/feed/ 0
City of Atlanta’s Cyber Breach: How to Avoid the Same Fate https://www.executech.com/insights/lessons-from-the-atlantas-cyber-attack/ https://www.executech.com/insights/lessons-from-the-atlantas-cyber-attack/#respond Fri, 17 Aug 2018 00:00:00 +0000 https://www.executech.com/insights/lessons-from-the-atlantas-cyber-attack/ The city of Atlanta fell victim to a crippling ransomware attack. The attack crippled several critical systems across the city. The police department lost access to certain databases, the judicial system lost the ability to process payments for traffic fines and other functions, and many other city services were taken offline. So, what is a […]

The post City of Atlanta’s Cyber Breach: How to Avoid the Same Fate appeared first on Executech.

]]>
The city of Atlanta fell victim to a crippling ransomware attack. The attack crippled several critical systems across the city. The police department lost access to certain databases, the judicial system lost the ability to process payments for traffic fines and other functions, and many other city services were taken offline. So, what is a ransomware attack? How did the City of Atlanta get breached? And how can you protect you and your organization from the same fate? Cybersecurity is the key to prevent cyberattacks.

What is Ransomware?

Ransomware is a kind of malware virus that hackers use to steal your data/services/access and hold it for ransom. To reclaim your information and network you must pay a ransom determined by the hackers. Even after payment, it’s common that hackers won’t return your data, or they’ll ask for more money. Ransomware virus’ can enter your system from anywhere. For example, Target had a major breach from a ransomware attack where the virus entered their system through a contracted HVAC servicer connected to their network while working on their AC.

How Did Atlanta Get Breached?

It’s unclear or unreported where the breach in the City of Atlanta’s network came from. However, the breach is a result of an under-protected network. Many municipalities have a low priority for cybersecurity and therefore allocate small funds to sure up their networks. Due to this fact, cities and towns are being attacked by cybercriminals frequently.  A small budget and low priority left the City of Atlanta’s network vulnerable.

Cities and towns are a hub of information, data, and money exchanges. Also, they represent services that are essential for thousands of residents and will, therefore, cause serious damage if the system is compromised. This dependability upon the networks is one reason why hackers target municipalities. They know that since the services offered are so important, compromising them will create a deep urgency to restore them, and that means money for the hackers. Also, hackers are aware of how under protected most municipal networks are and they make for easy targets.

It’s unknown if Atlanta paid the over $50,000 ransom, but regardless, this breach was costly. They lost access to critical systems for extended periods of time. During the restoration process, many procedures had to be done manually, and some services just had to be stopped. The cost that they incurred was far greater than the ransom and has taken significant energy, money, and time to repair, and it all could have been avoided.

How to Prevent Cyberattacks

Training

Preventing a cyber attack can be difficult. It’s hard to predict where attacks may come from and when they’ll strike. That’s why the greatest defenses against cyber attacks are preventative. The largest defense will always be information. Most ransomware viruses enter a network by human error. Meaning an employee opens an infected email or visits a corrupted website. Many attacks can be avoided by teaching staff to recognize potentially dangerous threats. Training staff will help to prevent cyberattacks.

Backups

A data backup is the best way to avoid data loss in the event of a hack. A backup is a stored copy of all your data and information. This is helpful because if a hacker ransoms your data, you can just reload your copy. Backups can be automated to run as frequently as you want. Therefore, you can have your network set to backup every night after everyone has gone home and it won’t affect your daily workflow. Backups may not prevent cyberattacks but they will help greatly minimize their effect.

Replication

A replication is a direct living copy of your servers and networks. These are different from data backups because a replication is a running mirrored server of your current server. So, if a server is down or is hacked, you just push a button and instantly switch to your other server that remains unaffected. This is the most seamless way to avoid downtime from virus breaches. One great thing about replications is that they contain your settings, passwords, preferences, and all necessary information for your servers to instantly run correctly.

Sophos Intercept X

Sophos has created the first software that can actually predict and defend against ransomware viruses. Sophos Intercept X uses artificial intelligence (AI) to actively predict and protect your network from breaches. Due to the nature of ransomware attacks, they’re very difficult to predict, and Sophos has created the only product on the market that can. Sophos Intercept X will help with cybersecurity and prevent cyberattacks.

 

For more information about cybersecurity and ransomware in the workplace, get your free business assessment from an expert consultant on IT Services in Seattle, IT Support in Spokane, or  Managed IT Services in Utah or Oregon.

The post City of Atlanta’s Cyber Breach: How to Avoid the Same Fate appeared first on Executech.

]]>
https://www.executech.com/insights/lessons-from-the-atlantas-cyber-attack/feed/ 0
Executech Named to the Inc. 5000 for the 6th Straight Year https://www.executech.com/insights/executech-named-to-the-inc-5000-for-the-6th-straight-year/ https://www.executech.com/insights/executech-named-to-the-inc-5000-for-the-6th-straight-year/#respond Wed, 15 Aug 2018 00:00:00 +0000 https://www.executech.com/insights/executech-named-to-the-inc-5000-for-the-6th-straight-year/ South Jordan, Utah– Executech, a premier provider of managed IT services in the Intermountain West has been named to the 2018 Inc. 5000. The Inc. 5000 is a list of the 5000 fastest growing privately held companies in the United States. This is Executech’s 6th straight year being named to the list. To determine what […]

The post Executech Named to the Inc. 5000 for the 6th Straight Year appeared first on Executech.

]]>
South Jordan, Utah– Executech, a premier provider of managed IT services in the Intermountain West has been named to the 2018 Inc. 5000. The Inc. 5000 is a list of the 5000 fastest growing privately held companies in the United States. This is Executech’s 6th straight year being named to the list.

To determine what companies will make the list, Inc. analyzes tens of thousands of companies. The ultimate deciding factor is the revenue percent growth year over year. Therefore, the list doesn’t consider the actual overall size of the company. There are some basic standards that a company must meet to be considered for the list, but they are few.

Speaking on this honor, Executech CEO and founder Eric Montague said “We are honored and proud to have received this recognition. We are excited about the incredible growth we have had and will continue to have as we always put our clients and employees first.”

Executech has become the largest and most-awarded IT outsourcing company in Utah, servicing over 2,000 company networks in Utah, Arizona, Oregon, Nevada, Colorado, California, Idaho, and Washington. Since 2011, Executech has been averaging annual growth well over 50%, and now has over 120 employees. Executech’s gross revenue places it in the top 3% of IT outsourcing firms in the nation. This top percentage is shared by an exclusive group of companies that have earned $10 million in revenue or more.

The Inc. 5000 is a product of the company Inc. The company Inc. was started in 1979 in New York City and they publish monthly magazines that discuss small businesses and startups. In 1982 Inc. published the Inc. 500 list. The list recognized the 500 fastest-growing private companies in the United States. In 2007 they added a second list, the Inc. 5000 to include more companies. In 2015 they’ve created a third list, a European edition of the Inc. 5000. An annual conference is held by Inc. to honor all companies who make their lists.

The post Executech Named to the Inc. 5000 for the 6th Straight Year appeared first on Executech.

]]>
https://www.executech.com/insights/executech-named-to-the-inc-5000-for-the-6th-straight-year/feed/ 0
Chinese Shipping Giant Victim of Ransomware Attack https://www.executech.com/insights/chinese-shipping-giant-victim-of-ransomware-attack/ https://www.executech.com/insights/chinese-shipping-giant-victim-of-ransomware-attack/#respond Thu, 26 Jul 2018 00:00:00 +0000 https://www.executech.com/insights/chinese-shipping-giant-victim-of-ransomware-attack/ Cosco Shipping Victim of Ransomware Attack The Chinese shipping firm, Cosco Shipping, was just hit with a Windows ransomware virus attack. The attack has caused many of their electronic communications at several North American locations to be inoperable. The breach happened within the last 24 hours and they have been working continuously to restore their functions. […]

The post Chinese Shipping Giant Victim of Ransomware Attack appeared first on Executech.

]]>
Cosco Shipping Victim of Ransomware Attack

The Chinese shipping firm, Cosco Shipping, was just hit with a Windows ransomware virus attack. The attack has caused many of their electronic communications at several North American locations to be inoperable. The breach happened within the last 24 hours and they have been working continuously to restore their functions.

Cosco Shipping is a part of China Ocean Shipping company. It’s the largest carrier of containerized goods in China and the fourth largest in the world. They operate heavily in the United States and most major ports in the world.

Most US Communication Down

Cosco’s US website, email, and many phone lines have been inoperable since the attack. This has forced the company to attempt to maintain communication via twitter and free yahoo email accounts. According to their Facebook page, the rest of their global operation seems to be operating normally.

All of their vessels are functioning at a normal capacity and are still expected to make all of their deliveries; albeit delayed.

Expected Full and Quick Recovery

According to CoscoShipping, they have slowed operations in the US in order to ensure safety and protection for their clients. There is no timeline given as to when they will be at full functioning capacity again.

It’s unclear what kind of Windows malware infected the company. However, Cosco claims that they are expected to make a “full and quick recovery”.

What is Ransomware?

Ransomware is a type of malware virus where the attackers seize control over your data and will issue a ransom to you in order to have it retrieved. Ransomware is very difficult to prevent against and can cause significant damage. Viruses like this only comes into the organization through user error; someone opening up an infected email or visiting an affected web page being the most common methods.

Last year, Maersk shipping was also the victim of a ransomware attack. They were infected by the Wannacry ransomware virus. The attack forced them to shut it’s facilities at the Port of Los Angeles for three days to clean up the virus.

How can you protect against Ransomware?

Ransomware is a form of malware virus and it’s very difficult to prevent against. As mentioned above, ransomware enters an organization through user error. One of the most common ways is through infected emails. Many of these emails are nearly identical to normal emails an employee will receive. For example, some emails will appear as if they came from someone within the organization and seem relatively normal. Upon opening that email the virus is then released.

The first line of defense is training staff on how to detect and avoid suspicious emails and web pages.

Second, your organization needs to be having consistent and frequent backups and replications made. This will allow your organization to have your data and systems backed up and copied. This way if you are the victim of a ransomware attack you can easily restore your systems, not have to pay a ransom and minimize downtime.

Finally, Sophos Intercept X is the only product on the market that helps to prevent ransomware attacks. It’s a machine learning program that works to anticipate and prevent the attacks as they come in. It’s surprisingly cheap at around $3 a user monthly.

Find out how we can help protect your business from ransomware with IT Services in SeattleIT Support in Spokane, or  Managed IT Services in Utah or Oregon.

The post Chinese Shipping Giant Victim of Ransomware Attack appeared first on Executech.

]]>
https://www.executech.com/insights/chinese-shipping-giant-victim-of-ransomware-attack/feed/ 0
Microsoft Build 2018: Microsoft Azure and Artificial Intelligence https://www.executech.com/insights/microsoft-azure-plus-ai/ https://www.executech.com/insights/microsoft-azure-plus-ai/#respond Mon, 07 May 2018 00:00:00 +0000 https://www.executech.com/insights/microsoft-azure-plus-ai/ Azure and AI The cloud has been a hot topic in tech for several years now. What it is, what it does, and lots of skepticism about its security. The cloud is now commonplace in business and it’s been around long enough we start to wonder, what’s next. Microsoft is pushing the envelope on the […]

The post Microsoft Build 2018: Microsoft Azure and Artificial Intelligence appeared first on Executech.

]]>
Azure and AI

The cloud has been a hot topic in tech for several years now. What it is, what it does, and lots of skepticism about its security. The cloud is now commonplace in business and it’s been around long enough we start to wonder, what’s next. Microsoft is pushing the envelope on the cloud with Microsoft Azure. So what is it, and why does your business need it?

The Cloud

Microsoft Azure is the future of the cloud. The cloud has been around for a long time and most of us are familiar with it. The cloud is simply a collection of servers that you can store data, files, and information on that isn’t in your office.

They call it the cloud because to users it seems that their files are being stored in some mystical cloud above, but really it just means that your files are stored somewhere offsite. Companies like Microsoft, Amazon, and Google all have massive cloud service offerings that allow for both personal and professional cloud storage options of any size. You have probably used some of these services at work, home, or school like OneDrive, Dropbox, or Google Drive.

What is Microsoft Azure?

The cloud has always been just a place to store files. As we know with technology, people are always finding new and better ways to meet the needs of consumers. This idea is what has led to the creation of Microsoft Azure. Microsoft Azure takes the cloud to the next level. With Azure, you can now build, deploy, and manage services and applications in the cloud. Azure also allows you access to Microsoft datacenters for function processing and computing. Azure takes your services to the cloud.

This means that you can now manage and run essential business functions from anywhere with access to Microsoft’s datacenters.  Azure allows for organizations to use the power of Microsoft’s data centers to build, deploy, and manage applications from anywhere.

Microsoft Build 2018: AI

This morning Microsoft held their annual developer’s conference where they talk about the future of Microsoft. One key topic they covered is the future of Azure. They discussed how the future of Azure is with AI (artificial intelligence). What does that mean for a business? Artificial Intelligence today doesn’t mean iRobot style bots that will take over the world; at least not yet. At its core, AI is computers with the ability to act intuitively. Given several options or courses of action, AI means that a computer has the ability to weigh the outcomes of a situation, make a decision, and act without having to be given a command by a person.  This is an obvious way for companies to increase their efficiencies. AI is the way of the future, and that future is here now with Microsoft Azure.

Azure and AI

Microsoft is now going to start using artificial intelligence in Microsoft Azure. Thus, allowing your applications and programs that you have setup with Azure to run more automatically. The main benefit this will bring is the ability for some functions and processes of your business to run with little to no human contact. This will also allow for many current functions to be sped up significantly. AI with Azure will allow your business to be more efficient than ever before.

 

Learn more about Microsoft Azure today. Get your FREE assessment to see if cloud services is right for your business with IT Services in SeattleIT Support in Spokane, or  Managed IT Services in Utah or Oregon.

The post Microsoft Build 2018: Microsoft Azure and Artificial Intelligence appeared first on Executech.

]]>
https://www.executech.com/insights/microsoft-azure-plus-ai/feed/ 0
WannaCry Strikes Again: Ransomware Hits Boeing https://www.executech.com/insights/wannacry-strikes-again-ransomware-hits-boeing/ https://www.executech.com/insights/wannacry-strikes-again-ransomware-hits-boeing/#respond Thu, 29 Mar 2018 00:00:00 +0000 https://www.executech.com/insights/wannacry-strikes-again-ransomware-hits-boeing/ We have a breaking cybersecurity story to share with you! Last night, reports came in that Boing was hit by the WannaCry computer virus. We’ve written about the WannaCry and other similar attacks before on the Executech blog. The ransomware virus, which is suspected to have originated in North Korea, will completely lock down a computer […]

The post WannaCry Strikes Again: Ransomware Hits Boeing appeared first on Executech.

]]>
We have a breaking cybersecurity story to share with you!

Last night, reports came in that Boing was hit by the WannaCry computer virus. We’ve written about the WannaCry and other similar attacks before on the Executech blog. The ransomware virus, which is suspected to have originated in North Korea, will completely lock down a computer until a ransom in bitcoin is paid.

When news broke about the attack on a Boing facility in North Charleston, things were pretty chaotic. The chief engineer at Boing sent out an alert about the virus calling for “All hands on deck.” He also said that “It is metastasizing rapidly out of North Charleston and I just heard 777 (automated spar assembly tools) may have gone down,” He was also concerned that the virus could hit equipment used in functional tests of airplanes ready to roll out and potentially “spread to airplane software.”

Fortunately, they were able to contain the outbreak and no critical systems were affected. The virus uses a weakness found in Windows systems that Microsoft has created a patch for. It’s unclear whether the patch was ineffective or simply not applied at this site.

The story serves as another reminder that businesses of all sizes need to make cybersecurity a priority. Making sure you have proper software protection and up-to-date systems is crucial in preventing threats like this one.

The post WannaCry Strikes Again: Ransomware Hits Boeing appeared first on Executech.

]]>
https://www.executech.com/insights/wannacry-strikes-again-ransomware-hits-boeing/feed/ 0
The KRACK Vulnerability: Everything You Need to Know https://www.executech.com/insights/krack-vulnerability-everything-need-know/ https://www.executech.com/insights/krack-vulnerability-everything-need-know/#respond Wed, 18 Oct 2017 00:00:00 +0000 https://www.executech.com/insights/krack-vulnerability-everything-need-know/ Early this week we learned about a new hack and security weakness that affects all devices that connect via wi-fi. This weakness, known as the KRACK vulnerability was found by a Belgian university researcher. What is KRACK? KRACK stand for Key Reinstallation Attack and refers to how a hacker could use existing protocols to get […]

The post The KRACK Vulnerability: Everything You Need to Know appeared first on Executech.

]]>
Early this week we learned about a new hack and security weakness that affects all devices that connect via wi-fi. This weakness, known as the KRACK vulnerability was found by a Belgian university researcher.

What is KRACK?

KRACK stand for Key Reinstallation Attack and refers to how a hacker could use existing protocols to get into a wi-fi connected device.

The hack works by using the standard protocol for securely connecting to wi-fi called WPA2. Experts have used the WPA2 for over 10 years and it is the standard across the world.

This week, researchers found a way to trick the WPA2 system into issuing new security keys to a hacker’s device. This would allow the hacker to view and access all data being passed on a wi-fi network. This could include anything like websites visited, passwords, bank account info and beyond.

Am I Affected?

Yes. We know it’s probably not what you want to hear, but nearly every device that connects to wi-fi will be vulnerable to this attack.

However, there are many companies that already anticipated this weakness and have provided patches and fixes. Ubiquiti, a provider of wireless devices sent out a patch immediately that prevents the attack. Other providers are sending out updates during the coming weeks.

What Can I Do?

Keep your devices updated with the latest patches, fixes and OS updates. This will ensure that you have the fixes in place that can prevent the attacks.

Avoid using public wi-fi or unfamiliar networks. Never exchange personal information while on a public network such as banking, insurance and other online activities that involve your personal data.

Whenever you browse the internet, you should stick to websites that have a security certificate. Look for the https at the beginning of the URL. While this is not a catch-all, it’s a good practice that will ensure the information you view and exchange on the site will be secured.

Technology is always changing and new discoveries are being made every day. It’s important to have good IT practices and cybersecurity measures in place for your home and business. Having a trusted expert on call to address these concerns is invaluable.

To receive the latest updates about cybersecurity threats, technology trends and business insights, subscribe to our newsletter.

The post The KRACK Vulnerability: Everything You Need to Know appeared first on Executech.

]]>
https://www.executech.com/insights/krack-vulnerability-everything-need-know/feed/ 0
Between the Bytes: Episode 13 https://www.executech.com/insights/bytes-episode-13/ https://www.executech.com/insights/bytes-episode-13/#respond Fri, 22 Sep 2017 00:00:00 +0000 https://www.executech.com/insights/bytes-episode-13/ Welcome to this week’s Between the Bytes where we are not as smart as your average nerd. I’m Arash Bankhshandehpour and I’m Gary Arnold. This week we’re going to be giving you some updates with some white hat hackers, the iPhone updates and the new products they’re coming out with, some facts with Equifax among other […]

The post Between the Bytes: Episode 13 appeared first on Executech.

]]>

Welcome to this week’s Between the Bytes where we are not as smart as your average nerd. I’m Arash Bankhshandehpour and I’m Gary Arnold. This week we’re going to be giving you some updates with some white hat hackers, the iPhone updates and the new products they’re coming out with, some facts with Equifax among other stuff.  

Tech News

Two-Factor Authentication Hack

A group of research hackers in Massachusetts were trying to find exploits and weaknesses in a system recently and were able to get into somebody’s Bitcoin wallet and account simply by knowing their name and mobile phone number, which aren’t hard things to come by. What they did was take your first and last name and get your Google account from that and your mobile phone number. Then, they have this system software that will intercept a text message, (straight out of Jason Bourne type stuff here), and the weakness isn’t in two-factor authentication. Two factors are when you receive a text to confirm you are who you say you are. The weakness is in the text messaging because they were able to intercept the text message saying, “here’s a code, verify who you are.” They drop that code and are able to log into somebody’s Gmail account. They went over to the Bitcoin wallet, said “reset the password again”, it sent a code to their cell phone number. The email may not have access to reset that was able to get in and presumably would have been able to release funds to another account. Obviously, they didn’t do that, it was just an experiment. But, it’s an interesting story about two-factor authentication. It’s something that you need to be aware of, it may be something you use on your own account and it’s easy to deactivate if it’s something you’re worried about. It’s a pretty rare instance so we don’t necessarily recommend just stopping all two-factor authentication because it’s a good security feature but just be aware that it’s out there. Learn more.

New Apple iPhone

Apple update: last week Apple released their new versions of their iPhones, including the iPhone X.It will have an OE l LED display, a much larger screen, and a smaller bezel. The cool thing that this phone is doing, is it no longer has the home button that all the iPhones have come to be known for. There’s also no keypad for a password to enter, it is face ID authentication to log in, it even works in the dark. Once again, it is customized to phone’s user. It’s a faster processor but there’s always a catch. The iPhone X is starting at $999 dollars and is not available until November. G4C Apple is continuing its kind of dominance in the cell phone world and these prices are significantly increasing. Apple knows its users and Apple users (bless your hearts) are very loyal. I buy laptops for cheaper than that so I’m out. I may have to give up my loyalties as well. (Come to the Google side.)

Record-Setting Electric Bus

In other news, a company called Proterra recently broke records for electric vehicles. Their electric bus went the longest distance on a single charge, farther than any other vehicle before, even the small, light one person vehicles. The electric bus was able to go 1,102 two miles on a single charge, which is incredible. No gas vehicle can do that regardless of the gas hyper. They are obviously trying to put this into further development and get it out to cities over the coming years to have that become a regular occurrence. They’re developing a supercharging station that will be able to charge the buses in about an hour, which again, isn’t a problem. Buses usually come to a garage anyway, so they’ve got all night to charge. That’s something to look forward to down the line, seeing electric buses buzzing around town.

Equifax Hack Continued

As we are aware, regarding Equifax several weeks ago, there was a hack breaching regarding 143 million Americans accounts. Now, Equifax also recently found out that there was another breach back in March. Fortunately, or maybe, unfortunately, we don’t know if any data was stolen but it is still scary that someone was able to make that breach as there’s a lot of vital, personal information for a lot of people on Equifax. Stocks are tanking for sure. We do want to let you know that Equifax has set up a website where you can sign up for credit monitoring and protection. That is something to look into, but also something to be very aware of is that scammers and criminals will be taking advantage of this and be saying, “hey check your credit or set up free monitoring.” You want to be very wary of offers that seem too good to be true from unfamiliar sources, always look at a link before you click on it, and see if it’s weird or where the email is really coming from. Tread lightly when it comes to this breach as there will be criminals trying to take advantage of it.

We’ve got a new piece of technology here at the Executech office that we wanted to show off a little bit. It’s something that we’ve been pre-moving as part of our grand opening. Thanks again, by the way, to all those who made it out to our grand opening last week. It was a lovely day, a ton of fun, and lots of great food and people. So we’ve got a new piece of technology as part of our new building, it’s actually right behind us (or you I guess) really cool piece of technology stay tuned for that we’ll be demoing.

Product Insider – Microsoft Surface Hub

On this week’s product insider, we have KC Kuhns who is one of the techs here at Executech, (he’s also been featured here on Between the Bytes), here to give us a description. Take us away, KC. This is Microsoft’s brand-new surface hub, it’s an 82-inch screen. It’s great for meetings, conference calls, and it has a lot of multitasking capabilities and overall it’s an awesome product for large environments. I’ll just jump into it. When you first load it up, it takes you to all the apps that are available. There are more apps that are available once you install all the updates and the plugins are ready for it. We’ll jump into just the whiteboard here so you can kind of see how the multitasking works on here. With this you can draw with your hands, (or there’s a pen right there) so both of us can be drawing at the same exact time. Like I said, it’s great for multitasking. So let’s say that you had somebody drawing over here, and you needed a presentation over here. You can do both things at the same time. One of the other cool things that you can do on here, (it comes preloaded with Microsoft’s Maps), on maps so you can zoom in on any location anywhere in the world. It comes with satellite images everywhere, (very similar to Google Maps) and then on here you can basically fly around in 3D space and see all different buildings and how things are laid out. Casey, once again,  thanks for coming by and making time for us, and that will do it for this weeks product demo.

Frontline: CCleaner Infected With Malware

This is frontline worthy: Welcome to Executech’s frontline, we’re bringing you breaking news about cyber-attacks and other digital threats that may be relevant to you. Recently on “Between the Bytes”, several weeks ago we covered a software called CCleaner. It’s actually a very useful software and a lot of techs will use it to clean up unnecessary data and other files hanging around your computer. Unfortunately, we’ve recently found out that CCleaner was infected by malware. Hackers were able to get in and inject malware into the legitimate software. Fortunately, the company that owns CCleaner has already sent out a fix so that the malware will not take effect, it will be removed. It also was only affecting 32-bit machines and most machines nowadays run on 64-bit so most people don’t even have anything to worry about. But, it is just something to keep in mind. Keep your software up-to-date, keep your operating system up-to-date, and all these things can be avoided. That’s it for today on Frontline.

We’re back. And you thought that we had forgotten about our third member of the cast but we haven’t. Alexa tell us a joke.

“Why do meteors prefer cold showers when they get home?”

“Why?”

“They’re always burning up on entry”

We’ll catch you next week on Between the Bytes.

The post Between the Bytes: Episode 13 appeared first on Executech.

]]>
https://www.executech.com/insights/bytes-episode-13/feed/ 0
The Latest Cybersecurity Threats You Need to Know About https://www.executech.com/insights/latest-cybersecurity-threats-need-know/ https://www.executech.com/insights/latest-cybersecurity-threats-need-know/#respond Thu, 21 Sep 2017 00:00:00 +0000 https://www.executech.com/insights/latest-cybersecurity-threats-need-know/ A Busy Week for Cybersecurity Over the past week, we’ve seen several stories about hackers, breaches and threats to your cybersecurity. We want to bring you the most current information so you can stay informed and safe. The following incidents have all been brought to our attention or made public within the past two weeks. […]

The post The Latest Cybersecurity Threats You Need to Know About appeared first on Executech.

]]>
A Busy Week for Cybersecurity

Over the past week, we’ve seen several stories about hackers, breaches and threats to your cybersecurity. We want to bring you the most current information so you can stay informed and safe.

The following incidents have all been brought to our attention or made public within the past two weeks.

BlueBorne Attack

A new attack was recently discovered by a research lab, Armis Labs, that could affect mobile, desktop and Internet of Things (IoT) devices. The researchers discovered a vulnerability in devices that could allow hackers to take control of a device and access private and corporate data. The attack uses the Bluetooth technology that many electronic devices have enabled. Because Bluetooth devices can be synced from larger distances, the attacks can also spread to devices that are not physically connected to the same network.

Here is a video from Armis explaining the attack:

It is important to note that Armis has been in contact with all of the major companies associated with the affected mobile and desktop operating systems. These companies have since created patches and updates to their software that should help protect against the issue. When in doubt, keep your Bluetooth turned off. This will keep your device secure and save battery power. Read more at the Armis website.

Hidden Malware in CCleaner

CCleaner, a reputable software used to organize and delete unnecessary files on your computer was compromised by hackers. Hackers were able to insert malware into the licensed software that would infect users machines. Avast, the maker of CCleaner says that the tainted version of the software had been installed 2.27 million times.

The infected version of the software was available and distributed for over a week. However, the company was quick to act and was able to send out an update to the software that disabled the malware from taking effect. Avast is reassuring their users that although it was a serious incident, there is no serious threat at this time.

We highlighted this news on our recent episode of Between the Bytes during our Frontline news section. Check it out.

Updates & Warnings From the Equifax Breach

You likely heard about the recent breach of the credit monitoring firm Equifax. Over 143 million users were compromised. This meant that social security numbers, birthdates and addresses were stolen from millions of people.

As if it couldn’t get any worse, the company is now saying they suspect that their network was hacked as early as March. They are unsure if any data was stolen at that time but clearly this was an early red flag. The US justice department has also opened a criminal investigation related to the selling of company stocks during this time frame.

Equifax Scam Warning

We wanted to specifically warn you about scams and threats that we’ve seen come about because of this breach. Criminals will try to use phishing scams and other tactics to lure people into subscribing to fake credit monitoring or data security. Be very wary of unfamiliar emails, posts and links related to this breach. Equifax has established a site where you can sign up for free credit monitoring. Please be careful as criminals may try to pattern fake sites to look like the Equifax site. Visit the Equifax site directly and then go to their dedicated page to take these steps.

White Hat Hackers Break Two-Factor Authentication

Researchers were recently able to use two-factor authentication as a way to gain access to a person’s bitcoin account. Two-factor authentication is meant to be an added security measure for account access. It is often created by sending a second message to a cell phone to confirm someone’s identity when they try to access or reset an account. This is not the only form of authentication, but it is the most commonly used and easy to set up. In this case, it was also the easiest to exploit.

With only the first and last name of a user and their mobile phone number, researchers were able to gain access to their gmail account and then reset the password to their bitcoin wallet and gain access. The research group from Positive Technologies was able to use a vulnerability in the cellular network itself to intercept incoming text messages. This allowed them to get the code necessary to learn someone’s full email address and change the password.

While two-factor authentication can still be a good security measure, it’s not perfect. Users can disable this feature in their Google accounts by changing their privacy settings.

Digital threats and cyber attacks are only increasing. Stay informed and protected by subscribing to our newsletter and get breaking news about digital attacks, cybersecurity, tech trends and business tips.

The post The Latest Cybersecurity Threats You Need to Know About appeared first on Executech.

]]>
https://www.executech.com/insights/latest-cybersecurity-threats-need-know/feed/ 0