Centrend

Author name: admin

Using a Whiteboard in 2020

https://www.youtube.com/watch?v=dyyB-OWr3So Technology Tips by Centrend Podcast: Episode 4 I love working with a whiteboard. In fact, I can think of no technique more effective for brainstorming a project than getting a team of folks to share ideas in front of a whiteboard.  In 2020, we are forced out of the office, but the need for project collaboration and groupthink doesn’t stop. Enter the digital whiteboard. A powerful team collaboration tool that lets you collaborate with up to 50 participants that can be located anywhere in the world. For this walkthrough, I’ll be showing you Google’s Jamboard. There are other tools, but this one is one of my favorites, and to get started, all you need is a Google account. Go to jamboard.google.com.  If you’ve used Jamboard already, your previous jams will be listed. If you’ve never used Jamboard or want to start a new jam, click the + sign in the bottom right corner. Experiment with the drawing tools on the left side. For example, select the pen tool and freehand draw shapes: You can then use things like the Text Tool to draw text on the whiteboard – either stand-alone or on shapes you’ve already drawn. You can also click the underlined A at the top bar to select a font color for the typed text. You can freehand draw shapes, just like on a real whiteboard. If you make a mistake, you can use either the eraser tool or the undo button to undo the last action. Here’s a really handy tip for you. If you want to draw a straight line, you can hold the shift key as you draw. Who needs a steady hand with this technology? You can type text, then rotate that text by clicking and holding on the top left of the text box. With the text rotated, you can still reposition it anywhere on the canvas. One of my favorite things about Jamboard vs. other whiteboard apps is the built-in image searchability. Instead of having to go to the internet in a new browser tab, find an image, save that image somewhere, go back to Jamboard, and import the image (remembering where you had saved it), you can do all this right inside Jamboard in just a couple clicks! First, click the Image Icon, then click the Google Image Search tab. This lets you search in the browser. Click the image you like and then click Insert. The jam is private until you share it. Sharing it unlocks the real power of this collaborative tool. To share, click Share in the top right. Then enter the email address of whom you’d like to invite. You can have them View only if you are presenting, or make them an editor if you want them to add and change the drawing. In the example below, I’ve added a technical consultant from Whiz Kid Support, our residential division of Centrend, to add the remote user part to our diagram. As they add elements, you will see their icon and initial appear. Usually, you would be on a video conference or at least a phone call while doing this, but you don’t have to be. You can have multiple pages on the whiteboard. To get a new whiteboard in the same file, click the arrow to the right of the whiteboard page marker in the top center of the screen: You can also click the shape icon and draw perfect shapes. Like this: Finally, the laser pointer is great for presenting ideas and talking about specific whiteboard areas in detail. You select the bottom tool from the left side toolbar, and then you can use this laser pointer effect to draw attention to an area of the whiteboard without actually drawing on it: The jam board software works on almost any internet-connected device such as an iPad or Android tablet or phone. On touch-enabled devices, you can draw on the device to draw on the board, and everyone will see your changes! As you can see, a digital whiteboard is a powerful, practical tool for team collaboration. There’s also a physical jam board for when you have some collaborators on-premises while working with remote team members at the same time. You can learn more about the physical jam board by clicking here. If you need help deploying this technology in your organization, please reach out for a free consultation. We can offer equipment, training, and consulting on many whiteboard solutions.   

Using a Whiteboard in 2020 Read More »

Fun Ways to Improve Your Typing Skills

https://youtu.be/8S-6LXy57Cg Technology Tips by Centrend Podcast: Episode 3 These days, when we aren’t on camera in a web meeting, it seems like we are typing on our computer keyboards. Typing skills are essential to be productive and competitive. I’m going to show you some effective and fun ways to improve your keyboarding skills. Everyone, no matter their age, should seek to develop their typing skills as much as possible. The faster you can get your thoughts out and into the computer, the more productive your entire day will be.  In this blog, I show you several great online resources for mastering the keyboard. First, www.ratatype.com. Ratatype is a good learning tool. Many teachers send their students here, and the format is a lot like an actual typing course. If you choose to create an account and log in, the site will keep track of your progress and present increasingly challenging lessons. I find this resource invaluable for practicing those harder letter/symbol combinations that you don’t get to type often but slow you down when you do need to type them. Next, www.typeracer.com. I have to admit; this one is my favorite. It can be very entertaining! I’ve watched entire offices playing during their break time to compete for high scores! You don’t have to log in here either. You can go directly to Enter a typing race.  Like Ratatype, if you log in, the site will track your high scores. Do you have problems with technology and want things to run better? For businesses, call us at 774-241-8600.  For support for home users or individuals, visit www.whizkidsupport.com or call 774-778-2800.

Fun Ways to Improve Your Typing Skills Read More »

Review Your Cyber Security Plan in Four Simple Steps

Increasing Threats Companies rely more and more on digital information and network-enabled devices. Threats are increasing, and cybercrime is on the rise, so it’s no wonder cybersecurity is increasingly important. Is your company prepared for a cyber attack? If you are like most small/medium businesses, you don’t have a written plan at all. If you have a plan, was it well thought out and tested, or was it thrown together quickly to appease a customer’s request? Take It Seriously It’s time to seriously consider the question: How would your business perform if it is hit by a cyber attack right now?  What would you do? Who would you notify? How would you recover? Cybersecurity Threat Evolution Cyber threats are constantly evolving, making it necessary to continually ensure your cybersecurity defenses and responses are effective for your business right now. A slow or inadequate response can have a very negative impact on the bottom line, along with your reputation. Regular Cybersecurity Audits It’s not enough to have plans in place; they need to be audited regularly. When was the last time your team updated the business’s cybersecurity plans? Are the documents current, and do they still meet the needs of each department? Has network and server equipment changed since the plan was written? What about 3rd party tools and services? The Four-Step Plan Regular internal audits are a smart way to prepare for a more comprehensive external audit.  The brief internal audit I’m recommending below can ensure your cybersecurity plans are up to date and functioning as they should. Here are the four quick steps you can take right now: Step 1 – Review your plans Pull out your documents and give them a hard look. Consider whether your policies and procedures still make sense. Has any personnel changed, etc… Ensure every component of the plan has a clear purpose and that roles and responsibilities for executing the plan are clearly defined. Every aspect of your plan should clearly say who has to do what and by when in the case of a cyber-attack. Step 2 – Assess risks and exposure Have any new services been introduced that have changed where threats can originate? For example, is there new off-site data storage or new wireless access points that have come online? Have there been other infrastructure upgrades such as new server hardware, software, or cloud-based services? If you discover new risks or identify new components, make sure to update your plan to include them. Step 3 – Consider security standard Once you have reviewed and updated the plan, consider whether it meets applicable security standards. If you work with CUI data (confidential unclassified information) under NIST 800-171, for example, do you meet the requirements appropriate to your role?  Does your plan meet the requirements of your standards? How does the plan measure up to general industry best practices?  Step 4 – Test for Action Would employees be able to use the plan in the case of a security breach? Where might a breach be discovered, and who would discover it? Would that person or group know what to do? Does the plan define who they would contact and how long it would take to mitigate the breach and fully resolve the situation? If you’ve taken a look at these steps and are still unsure whether they would be effective, Centrend can help you with a professional external audit. Give us a call or submit our contact form for a free Q&A session to discuss your organization’s readiness for handling a cyber attack.

Review Your Cyber Security Plan in Four Simple Steps Read More »

Don’t Get Caught by a “Phisherman!”

https://youtu.be/FtdD_mQsTRg Technology Tips by Centrend Podcast: Episode 2 “Phishing” is a social hacking attempt to get you to reveal information that hackers can use to exploit your email or computer account. Here are some clues on how to detect a phishing attempt and what you should be looking for. Welcome to Email Phishing Anatomy 101! You cannot assume that an email you receive actually came from the sender it claims to be from. Phishers are very crafty and will do everything they can to appear familiar so that you will follow their call to action. The infographic below illustrates a very clever phishing email. “Keep Same Password” Now, what would happen if the recipient actually clicks the button? Now, what would happen if you clicked the button? You would be taken to a website that looks like an Outlook Web Access Portal and asked to do the following things: They tell you to confirm your current login name and password to “renew” it. Upon submitting your name and password, you are taken to a screen that asks for previously used passwords for verification purposes. This process is open-ended. The more time you spend time submitting passwords, the more data they collect to hack into other systems at your organization. You can do several things in your business to reduce the amount of these types of emails that actually make it through. Use a strong commercial-grade firewall with deep packet inspection. If you’re suspicious, don’t click the link. Instead, log in by going directly to the website yourself. Have strong endpoint security software on your workstations, so if you do click a link, you will get a warning like Centrend’s managed service clients get (see grap[hic at right) Centrend works hard to protect our customers from phishing by blocking many of these types of threats from ever entering your network or email folder, to begin with. Everyone gets fooled, especially if you are in a hurry. For times like this, we make sure there is local workstation security to safely check suspicious links. For example, clicking on the email below in one of our managed services environments will give the email recipient a second chance to reconsider by showing the following message: If you want to keep the phisherman from trolling your computer’s waters, give us a call or drop us a line.

Don’t Get Caught by a “Phisherman!” Read More »

How to Fix Common Zoom Meeting Problems

https://youtu.be/cc2rpvI-SH8 Technology Tips by Centrend Podcast: Episode 1 We’ve all come to rely on online meetings to stay connected with business associates, remote learning for our children, and keep in touch with our loved ones that we can’t visit in person. That’s why in this first episode of my video podcast, I’m going to show you how to diagnose and repair one of the most popular tools for online meetings: Zoom. In addition to going over troubleshooting and repair steps for your sound, video, and microphone problems, I’ll also show you how to change your name’s appearance in Zoom calls. You can watch by clicking the video or scroll down if you prefer to read and view the relevant screenshots. Troubleshooting Sound, Video, and Microphones in Zoom The scenario is I’m in a Zoom meeting, and the other participants tell me that they can’t see or hear me. Putting my mouse at the bottom of the window, I can see that my microphone is muted, and my video is off. I click the Microphone with the line through it, and now my Microphone is on. But when I click to start the camera, I get an error: To troubleshoot, click the small arrow pointing up next to the Video icon, and a menu will appear. Taking a closer look, I see that the selected camera is “Logi Capture,” and that is not my web camera!  The correct camera is HD Pro Webcam C920. Once I select the correct camera, I can click the icon, and my video starts! If your situation is that you don’t see a camera listed, check the physical connection cable between your camera and your computer. If you are on a laptop and your camera is built into your screen, you might need help troubleshooting hardware drivers. Call us or fill out our Quick Contact form to the right, and we’ll give you a hand with it. If you are having problems with not being able to start the microphone, or if it starts and they can’t hear you, click the small arrow pointing up next to the Microphone icon, and a menu will appear as shown in the picture below. From this menu, you can select the correct microphone and speaker that you are using. If you aren’t sure which to choose, the webcam is probably the correct choice for the microphone, and “Same as System” will probably work for your speaker selection. Note: If you are using a headset on your computer, your headset model should be selected for both microphone and speaker. Changing the Appearance of Your Name in ZoomSometimes the host of a meeting will ask participants to have the name appear a certain way. Usually, they request identifying information to appear with your video feed, such as your First Name – Company Name. In the scenario I’m going to cover, I had to quickly change my name to save myself some embarrassment. ???? I had been away on business and set up to do a Zoom call with my little girls back home.  I changed my name to their nickname for me, “Daddy Dragon.” The next day I hosted a Zoom call and waited for the other participants to join when I realized my name still said, “Daddy Dragon.” Rather than have to explain myself, I quickly went to work to change my name. Here’s how I did it. I clicked the icon at the bottom of the screen that says, Participants. This made a list of participants appear at the top right of the Zoom screen. I hovered over my name and selected More > Rename. Then a window pops up that lets me change my name. I hope my blog gives you the confidence to resolve video, sound, and microphone issues and manage your name’s appearance on conference calls. We publish Technology Tips by Centrend every other week, so please subscribe to our newsletter and blog for more great tips!

How to Fix Common Zoom Meeting Problems Read More »

What 6 things increase the longevity of your computer?

Individuals and small businesses struggle with ways to increase the lifetime value of their PC hardware. ​ What can you do​ to keep your computer running strong like you?​ Extending the life of existing desktops and laptops to reduce your cost and lower your budget is critical in today’s economic climate. Families and companies alike are dealing with limited resources and need their computers to last more than a couple of years. The truth is a quality computer that is maintained will last several years – perhaps even a decade! So how do you make sure your PC investment lasts? The first factor is your buying strategy. Start with a quality computer build. If you buy the cheapest, bargain-basement computer off the shelf, you can’t expect it to last as long as a solid business-class or mid-range residential system. The reality is for a few dollars more you end up with hardware that will last six or more years. Assuming you started with a decent build to begin with, a PC tuneup will go a long way toward extending your computer’s speed and overall life. Here’s a list of things you should be doing at least quarterly to keep your computer running well: Proactively clean and defrag your computer Repair registry issues with your system Keep up to date with hardware drivers Your operating system should be updating regularly – make sure that it’s happening Maintain antivirus software (besides what the computer operating system comes with) Check for add-ons and other unwanted leeches that sap your computer’s resources Centrend can take care of all these things for your business with our automated tools. Give us a call! If you are a home user or solopreneur, visit our whizkidsupport.com site for affordable maintenance plans tailored to your individual needs.

What 6 things increase the longevity of your computer? Read More »

Is My Internet Service Provider’s Firewall Strong Enough?

When an Internet Service Provider (ISP) installs internet access in your business, you are usually provided with a router/firewall combination. Do you need to invest in a commercial-grade firewall, or is the ISP’s firewall sufficient? Let’s start with a simple description of what a firewall is and how it protects your network from intruders. The role of a firewall is to determine what data can come in, and what data will not be allowed. The pieces of data that arrive at your firewall are called packets. For a basic firewall, the rule is simple:  If somebody requested the packet, it is allowed into the network. If the packet was not requested, the firewall burns the packet. The graphic below shows a typical small business network. BASIC FIREWALL – LIKE FROM YOUR ISP When a packet approaches the firewall, It is analyzed to see if it should be let in. A basic firewall is only going to ask one question before deciding to let the packet of information into the network: Was the packet requested by someone inside the firewall? COMMERCIAL-GRADE FIREWALL When a packet approaches a commercial-grade firewall, it is scrutinized much more carefully and in BOTH directions – IN and OUT, When it decides to let the packet pass through, the decision is logged in a database. The activity log proves invaluable in chasing down and isolating data breaches. Here are some of the things a business-class firewall considers before letting a packet pass: Was the password Requested? Is the packet SAFE to let in or does the packet contain a virus, malware, or other malicious code? Is the destination internet address listed on any “blacklists” due to bad activity coming from there? Is traffic from the country of origin allowed? Does the corporate policy for content filtering allow access to the material that is on the destination website? The chart below shows examples of the types of traffic that are allowed or blocked by the different firewall options. The commercial-grade firewall is not only a strong defense against unsolicited traffic, but it also gives business control over what content is allowed on their network. Business-class firewalls are surprisingly affordable. If you would like help evaluating whether it’s right for your home or business, please give us or fill out the contact form below.

Is My Internet Service Provider’s Firewall Strong Enough? Read More »

Six Ways Scammers are taking advantage of COVID-19

Cyber Criminals are taking advantage of the COVID-19 pandemic in some of the worse ways. Read on to learn how to avoid their evil scams… 1. Phishing: Phishing (pronounced fishing) occurs when criminals send fake mail, email, or phone calls pretending they are legit. They try to convince you to share your sensitive information like passwords or credit card details. They pretend they are from an organization you know, such as FedEx, UPS, or even a government agency. 2. Fake Products: Keep your eye on e-commerce websites, social media accounts, and emails from people and stores claiming to sell medical supplies currently in high demand. Supplies might include things like hand sanitizer, toilet paper, and surgical masks. When you make purchases from these fake stores, criminals will keep your money, but you will never see the products you purchased. 3. Fake Charity: Individuals and companies, sometimes with real-sounding names, call or email to ask for donations for people and groups affected by the coronavirus. Some of their elaborate backstories sound extremely legitimate and emotional but completely fake. 4. Medical scams: People are getting calls and emails from people pretending to be hospital workers or medical professionals claiming they treated someone they know for the coronavirus and demand payment. 5. Malware. Think of these malicious applications as Trojan Horses. You download them to your computer or phone for some purpose, and behind the scenes, the program is stealing your personal information. Sometimes these record your logins to banking sites, email, Facebook, etc., and send the data back to the hackers. 6. Zoom Bombing. Lots of businesses, schools, and individuals are using Zoom to hold online meetings. To make it easier, meeting hosts often don’t require a password. Unfortunately, not having a password makes it all too easy for hackers to jump on your meeting and flood your virtual room with swear and porn. They can embed virus code in the image files or stealthily share a file with all the participants that have virus or malware code in it. Check our blog next week for details on how to keep hackers out of your Zoom meetings. The number one way to protect yourself from cybercrime is to use strong passwords on your computer, phone, and meetings and make sure your computer is tuned up and secure. If you ever feel concerned that your computer system is hacked or you just want a security checkup, please contact us at 774-241-8600 or submit the quick contact form on this page. We’re always here to help!

Six Ways Scammers are taking advantage of COVID-19 Read More »

How do you know if you have Spyware in your computer?

Sometimes, it’s obvious, right?  There is a big obnoxious warning that pops up and tells you that you are infected and you need to call for support! Don’t call the number presented because that’s a scam. Call us instead!  Other times, the infection is much more subtle. Here are some things to watch out for… Signs that your computer is infected with a virus or malware Random pop-ups – if you are using your computer, especially the web browser and you are getting a lot of pop-up messages without clicking If you click a link in a web search but get an unexpected, less relevant result If in the bottom right, you are bombarded with notifications and solicitations If your browser has extra “toolbars” across the top or bottom that weren’t always there, or that you don’t see on other computers If you suddenly can’t open documents on your computer that you have always been able to open You are prompted for a password at a strange time. Such as when you are just working on a Word document or browsing a website that doesn’t require login Your virus scanning software is no longer running – malware or a virus may have shut it down If you have any of these problems, please call us for help! If you aren’t sure if you are infected, we are glad to offer a free consultation. Just fill out the Quick Contact form or call us at 774-241-8600.

How do you know if you have Spyware in your computer? Read More »

How to Clean and Disinfect Computer Equipment Without Destroying it

With the threat of coronavirus (COVID-19) all around us, we are all being more diligent about wiping down our work areas. One of the highest touch areas in your environment is your keyboard, mouse, and touch screens. If you’re a customer of Centrend, I already have the inside of your computer covered with strong antivirus software. So here’s how to keep your stuff clear of the other types of viruses. Important note: Off-the-shelf brands of “electronic wipes” are NOT disinfectants unless they specifically say so. At the left is an image of a common one that is NOT a disinfectant. It may wipe away the virus but if there is any left on the surface, it will stay alive. I recommend using Isopropyl alcohol. The CDC recommends the solution have at least 70% alcohol content. The one I use is pictured at right. Mine is 91% but as long as you are 70% it should be effective. So how to disinfect your equipment with these products? It will depend on the specific equipment so I’ll go through each category one by one. Screens & Phones Make sure the device is off. Always apply the solution to a cloth and don’t spray the equipment directly Use a MicroFiber to make sure dust and lint don’t collect on the screen. If the screen appears physically dirty, you may want to clean it with a paper towel or other soft cloth and save the microfiber for after. If your Microfiber cloth gets dirty, you can wash it with mild detergent and a soft-bristled brush like an old toothbrush. Dry the screen or wait till it is dry to turn it on again. Keyboard Unplug your keyboard from the computer or shut it off if it is wireless. Hold it upside down over a trash can and give it a few shakes. This will knock food crumbs and other particles out of the keyboard. You can use compressed air to help blow out crumbs. Just don’t hit it too hard with the air stream or you will blow keys off the keyboard! Apply the cleaning solution to the cloth. Never spray solutions directly onto the keyboard. To get in between the keys, you can use a cotton swab (Q-Tip) that you dip in the solution. Be sure there isn’t so much solution on the swab that it drips into the keyboard. Mouse or Touchpad Unplug your mouse from the computer or shut it off if it’s wireless. If your mouse has a scroll wheel, hold it upside down and spin it a few times to get any loose particles out of the inside. Apply the cleaning / disinfecting solution to a cloth and be sure it’s not too saturated. Your mouse has openings that you can’t let the liquid run into. Let the mouse dry before plugging it back in or turning it on again. I hope you’ve enjoyed my article and it helps you stay safe and healthy!

How to Clean and Disinfect Computer Equipment Without Destroying it Read More »

Scroll to Top