Centrend

Author name: admin

Learning to Use Windows in Windows

In today’s video blog, I show you how you can snap windows to the corners of your display essentially creating a multi-monitor effect on a single screen. It’s really handy when you need to look at two different windows at the same time. We’ll start with positioning two windows on the screen. Switch to the application you’d like to have on the right panel. If the application is full screen, click the window toggle to the left of the X you could use to close the window. Then drag the application to the right-hand edge of the screen: When you let it go, the window resizes and snaps to the right half of the screen. The left side transforms to a selection of all the other windows you have open. You can then choose the application window you’d like to have a snap to the left side by clicking on it. When you make your selection, you’ll have both application windows sharing the screen. As I show below, I have Word snapped to the right side and Excel on the left side. If instead of using the side of the screen, you can snap applications to the corners which will let you have up to four items snapped on the same display! See my example below of a four-way split between a file folder, a Word document, my Passport PBS ERP system, and MS Excel. Using the techniques I’ve just shown you, you can take better care of your screen real estate!

Learning to Use Windows in Windows Read More »

How to Set Up and Use a Password Manager

https://www.youtube.com/watch?v=z9Kx9rND6x4 Passwords are a hassle, no doubt about it! In this blog post and video, I show you how to set up a password manager to help control password chaos. There are two tools that we recommend for managing passwords. One is LastPass, which is a cloud-based solution.  The other password manager I’ll show is Keepass for which the data files are stored locally on your computer. LastPass To get started with LastPass, go to www.lastpass.com. Before we download it, let’s review Plans and Pricing. LastPass is free to use for keeping track of an unlimited number of passwords on your desktop OR your mobile device. You need to pay for the premium version if you want to use it on both your mobile device and your computer. The premium version is also very handy for storing sensitive documents because it comes with a gigabyte of encrypted storage space. Scans of your driver’s license, bank account details, passport info, etc. are the types of things uploaded to their document vault. I recommend starting with the free version to get started. Follow the prompts to create an account. KEEP CAREFUL TRACK of this password as it is your master password. They call it the “LAST PASSword you will ever need.”  There are strong complexity requirements so keep an eye on the real-time feedback the systems give you as you create the Master Password. Click “Sign Up It’s Free” and your account is then created. Follow the link to install the LastPass extension to your browser. You are then in your vault and you can click the Plus option to add items to your vault. With the extension installed, it will automatically prompt you to store passwords for you as you use your browser to log into various sites. When you click a web-based item in your vault or from the extension in the web browser (see below), LastPass will launch the site in a new web browser window and log you in! KeePass Some people are not comfortable storing sensitive data such as passwords and credit card information in the cloud. For anyone with that concern, I recommend KeePass. KeePass stores the files locally. Be sure to make it part of your backup plan so you don’t lose the file if your computer crashes! To download, go to keepass.info/download.html and click the download link for KeePass 2.x (KeePass 2.47 at the time of this post) Click at the bottom to run the application once it’s downloaded:  Choose your language preference and accept the defaults on the next screen. It’s a good idea to create a Desktop shortcut and Quick Launch shortcut and leave all other defaults. Once it’s installed, you’ll create a database. Click the New icon just below the File menu option in the top left of the application. The database is the repository where all your passwords can go. You might save it in your documents folder. Again, be very careful as to where you store this as you’ll need to make sure you back it up regularly. Create the master password. Enter a strong password and use the Estimated Quality bar for feedback as to how strong the master password is getting to be. You are looking to be in the green: After you have finished creating the master password, you will be prompted to print an emergency sheet. The emergency sheet is used to recover your database, should you lose your master key. In the application, click the picture of the key to add a new entry. Put in the details for the new entry. Be sure to put in the URL so you can use features in Keypass to open the site and then put in the name and password for you. To visit the site and have it log you in, there are three steps. First, click the entry in the list of keys that have been added.   Next, click the little globe icon. A browser will open to the URL you entered for that Keypass entry. Finally, switch back to the Keypass application, press and hold CTRL and press the V key. This performs Keypass’s autotype function which types the login name and password in for you. I hope you found this post on password management helpful and that you use one of these tools to control your own password chaos.  If you need additional help installing or using these applications, please email or give us a call!

How to Set Up and Use a Password Manager Read More »

Sanitize your Electronics with UV Sanitizer Gadgets

https://www.youtube.com/watch?v=yqXYClyi-gc Using a UV Sanitizer is an easy and safe way to protect yourself from germs lingering on your electronics. In this blog post, I show you how to use two different devices designed to keep you safe. First, the phone soap.  This is a very slick device designed to sanitize your phone specifically, though you can put other things in there, too, such as your wallet, credit card, or keys. Just so long as the lid closes, the sanitization cycle will begin to clean whatever is in there. The Phone soap appliance I’m using here has Qi wireless charging, so you can actually charge your phone while it sanitizes. Though the cycle is only 10 minutes long, it’s easy to get caught up doing other things, and comforting to know the phone is charging while it sanitizes. If your phone doesn’t support Qi wireless charging, there is a small cut-out on the end where you can route your charging cable to plug it in while the sanitization cycle commences. You can find this appliance and many other options by this same great company at https://www.phonesoap.com/. If you are looking for something larger, take a look at the Hy-Genie Collapsible UV Sanitizer.  This unit collapses down to fit in your luggage, so it’s ideal for travel. It sanitizes everything you load up in there in just three minutes. As with the Phone soap, the gear does not have to be turned off to be sanitized. I put my Kindle, eyeglasses, phone, and Earbuds in there all at the same time with plenty of room. You can find this device at https://morningsave.com/deals/hy-genie-large-uv-c-sanitizing-collapsible-travel-bag-3 If you enjoyed this review, please drop me an email, submit the contact form, or otherwise let me know and I’ll post some more for you.   

Sanitize your Electronics with UV Sanitizer Gadgets Read More »

How to Use Multi-factor Authentication

https://www.youtube.com/watch?v=lW7FhDMmzNY Multi-factor authentication is a very secure process of keeping your sensitive data private. In this blog, I explain in simple terms what Multi-factor authentication is, why you should use it where available, and how you can use it to keep your data private. First, what is Multi-factor authentication and why is it so strong? Think of Multi-factor authentication as a temporary, second password. Where can you use multi-factor authentication? Multi-factor authentication is commonly used by banks but more and more websites and other services are catching on to it. Here are a few areas you’re likely able to use Multi-factor authentication or, MFA for short: Bank Account Log-ins Facebook Gmail or Microsoft accounts. Mortgage or Car Payment websites Any site or service that requires a high degree of trust How Multi-factor Authentication Works When you log into a website, for example, before you are granted access, you are required to enter a second password. See the diagram below: Step 1: Log into the website.Behind the scenes, the website sends a code to either your cell phone via text message, your email account, or your Authenticator App as I demonstrate in the Video Blog post. Step 2: You enter the code into the website and you are then granted access. You must enter this code within a certain time limit or you’ll need to start the login process again. Many sites will allow you to establish more than one method of receiving the code. This is great for times when you don’t have your cell phone handy but you can get to your computer. Where Can You Find the Settings? Different websites call multi-factor authentication different things. They may also refer to it as 2-step verification or 2-factor authentication. It all means the same thing for our purposes. Check these areas and if multi-factor authentication is offered, you should be able to find it: My Account User Profile App Settings App Preferences Security Settings So the next time you are on a website or accessing a service that you feel you would really like to protect, check whether it offers multi-factor authentication. It’s a great way to keep your data safe and your online information private. If you ever need help with any aspect of cybersecurity or online privacy, please reach out to us for a free consultation or security assessment.

How to Use Multi-factor Authentication Read More »

How To Set Up Email Signatures

https://www.youtube.com/watch?v=pT298DBYG8Y Technology Tips By Centrend Podcast: Episode #6 Don’t you admire the professional look of a well-crafted email signature? Much more than just a name, a well-designed email signature is a block of text and graphics representing you and your brand. In this video podcast, I will show you how to create professional-looking email signatures in two of the most popular email clients; Gmail and Outlook. We’ll start with Gmail, then do the same thing in Outlook. In Gmail, click the Gear in the top right, next to your icon/avatar. The basic visual settings appear. Click See All Settings. You’ll be on the general tab. Scroll down quite a ways till you see Signatures. You can edit an existing one here if you decide to change it later. Since this is our first time creating a signature for this Gmail account, click Create New. Give it a name. You’ll see in a minute that you can create different signatures for replying vs. new messages. You can also change the signature on the fly when you create or reply to a message. This can be useful if you sometimes want to include your cell phone as a contact number, but by default, use your office number in signatures. I called mine Centrend. Click the pencil icon to edit the signature name if you want to change it. The box to the right of the signature is where you create what you want the signature block to be. Type your signature as you’d like it to appear. I’ll start with my Name. Then add my title. Then my phone number and extension. The content is correct, but it looks boring. I’m going to choose one of the other fonts Gmail allows and make my name bold. First, I highlight all the text and then click the dropdown that says “Sans Serif” I can then change it to any listed font. I’ll choose the Tahoma. It’s looking better, but the signature is very small.  With the signature text still highlighted, I’ll click the Text Size icon and increase it from Normal To Large. The text is now the way I’d like it to be, but I want to finish up the signature with my logo at the bottom. Clicking the Image icon gives me a photo selector. Because this is Gmail, it’s integrated tightly with google drive, so if I have my logo already on Google Drive, I can choose it from the list or search for it. The Centrend logo that I need is on my local computer, so I click upload. From here, I can find it on my computer and just drag it into the block to show to upload it into Gmail. Now that image appears below my signature. If you don’t want to set your signature to always appear, you can insert the signature from the bottom right of the compose window by clicking the Pen icon. If you are like me, you will probably want your signature to appear automatically when you create a new message, reply to a message, or both. Right below the Signature you just created, you can choose a signature to default for New Email messages or when you reply/forward a message. Just choose it from the drop-down as shown. Scroll to the bottom and click Save Settings to save your new signature and defaults. That covers Gmail signatures. Now let’s take a look at how to create a signature in Outlook.  Note the version of Outlook you are running might be slightly different, but the concept and general location of everything I’m showing you are the same. In Microsoft Outlook, Pull down the File menu and choose Options. Choose Mail – in the menu on the left. Then click the Signature button. Your signatures will open.  Click New and give the signature a name. In the window below, you can type the signature as you want it to appear. To make it fancier, you can highlight the text and click the drop-down to edit the font. Notice you have access to all the Windows fonts instead of the limited font selection Google’s Gmail offers. You can click Insert picture, to insert a logo. A Windows Explorer Dialogue box opens so you can select the image from a folder on your computer. Click Save, and then the signature will be available to choose for New message or reply/forward. If you have any trouble creating or managing your signature, reach out to us, and we’re glad to help.

How To Set Up Email Signatures Read More »

How to Recover Your Windows 7 Password

https://www.youtube.com/watch?v=V5dFilcmY4w Technology Tips By Centrend Podcast: Episode #5 With the scarcity of computers right now and the need for additional computers for remote working and remote learning, many folks are dusting off their old Windows 7 computers. The problem is, you may not remember the password to it. In this blog entry, I show you how to recover a Windows 7 password, without a recovery USB stick. While it’s not ideal to use Windows 7 computers as they are no longer under support and may have unpatched security vulnerabilities, it may be necessary to get you through the pinch. The first step is to click the bottom right corner to shut Windows down. Turn the computer on and immediately being rapidly pressing the F8 key.  A menu should appear like the one below. Use the arrow keys to arrow down to Safe Mode with Command Prompt. Press Enter and Windows starts in a special boot mode.  If the Administrator account had been already activated, we would see an option here to change users.  Since no additional account appears that we can switch to, we will be able to boot to alternate media and turn on the hidden administrator account! You’ll need media to continue. While modern Windows 10 computers don’t usually come with any media, many if not most Windows 7 computers shipped with either a DVD or a USB stick. If not, contact us and we can help you find media to use for recovery. Shut the computer off again. Insert your recovery media into the DVD player or the USB stick into a USB slot. Turn the computer back on and this time rapidly press the F12 key for a boot options menu.  Note: Some computers don’t use F12. If F12 doesn’t work for you, watch your computer’s screen for a hint. It could be Del or F2 key for example. Use the arrow keys to select the media you inserted. This could say DVD or USB. Press Enter. As soon as you press enter, you’ll be prompted “Press any key to boot…” Press a key such as Enter to get the computer to boot the recovery media instead of your internal hard drive. You’ll see a message “Windows is loading files…” It will look like it’s a brand-new install of Windows 7.  Choose the default language, then click next. When the install/repair menu comes up, click Repair your computer. After a few minutes, you will be presented with a menu to choose the operating system. Click Next. Now for the recovery option, choose Command Prompt. When the command prompt opens, type the following and press the Enter key: net user administrator /active:yes You should get a reply that the command was completed successfully. Type Exit and press the Enter key and you’ll be back at the System Recovery Options menu. Click Restart to restart the computer normally. You will not press anything at boot-up this time. If you end up in Recovery mode again, remove the media and restart the computer to boot normally. Once you boot normally, you will see both the original user ID along with an administrator login that you can choose. Choose Administrator to log into that account. You won’t be prompted for a password because we didn’t set one. All we did at the command line was activate the account. It will take a few minutes for the administrator profile to be created. Once you see the desktop, we can set the password on the account we want to use with the computer. In this example, the name of the account is Mark. Click the start bubble at the bottom left, then go into the control panel. Next, go to User Accounts, the Add or Remove User Accounts. Click the account name you want to reset the password on. Now you can click either Remove the password or Change the password. Now restart the computer and you will be able to get right into your usual user profile again! Be sure to either disable the administrator account or set a password for it to keep your computer secure. If you get stuck at any part of this process, give us a call or submit our consulting form for a quick free assessment of your situation.

How to Recover Your Windows 7 Password Read More »

Using a Whiteboard in 2020

https://www.youtube.com/watch?v=dyyB-OWr3So Technology Tips by Centrend Podcast: Episode 4 I love working with a whiteboard. In fact, I can think of no technique more effective for brainstorming a project than getting a team of folks to share ideas in front of a whiteboard.  In 2020, we are forced out of the office, but the need for project collaboration and groupthink doesn’t stop. Enter the digital whiteboard. A powerful team collaboration tool that lets you collaborate with up to 50 participants that can be located anywhere in the world. For this walkthrough, I’ll be showing you Google’s Jamboard. There are other tools, but this one is one of my favorites, and to get started, all you need is a Google account. Go to jamboard.google.com.  If you’ve used Jamboard already, your previous jams will be listed. If you’ve never used Jamboard or want to start a new jam, click the + sign in the bottom right corner. Experiment with the drawing tools on the left side. For example, select the pen tool and freehand draw shapes: You can then use things like the Text Tool to draw text on the whiteboard – either stand-alone or on shapes you’ve already drawn. You can also click the underlined A at the top bar to select a font color for the typed text. You can freehand draw shapes, just like on a real whiteboard. If you make a mistake, you can use either the eraser tool or the undo button to undo the last action. Here’s a really handy tip for you. If you want to draw a straight line, you can hold the shift key as you draw. Who needs a steady hand with this technology? You can type text, then rotate that text by clicking and holding on the top left of the text box. With the text rotated, you can still reposition it anywhere on the canvas. One of my favorite things about Jamboard vs. other whiteboard apps is the built-in image searchability. Instead of having to go to the internet in a new browser tab, find an image, save that image somewhere, go back to Jamboard, and import the image (remembering where you had saved it), you can do all this right inside Jamboard in just a couple clicks! First, click the Image Icon, then click the Google Image Search tab. This lets you search in the browser. Click the image you like and then click Insert. The jam is private until you share it. Sharing it unlocks the real power of this collaborative tool. To share, click Share in the top right. Then enter the email address of whom you’d like to invite. You can have them View only if you are presenting, or make them an editor if you want them to add and change the drawing. In the example below, I’ve added a technical consultant from Whiz Kid Support, our residential division of Centrend, to add the remote user part to our diagram. As they add elements, you will see their icon and initial appear. Usually, you would be on a video conference or at least a phone call while doing this, but you don’t have to be. You can have multiple pages on the whiteboard. To get a new whiteboard in the same file, click the arrow to the right of the whiteboard page marker in the top center of the screen: You can also click the shape icon and draw perfect shapes. Like this: Finally, the laser pointer is great for presenting ideas and talking about specific whiteboard areas in detail. You select the bottom tool from the left side toolbar, and then you can use this laser pointer effect to draw attention to an area of the whiteboard without actually drawing on it: The jam board software works on almost any internet-connected device such as an iPad or Android tablet or phone. On touch-enabled devices, you can draw on the device to draw on the board, and everyone will see your changes! As you can see, a digital whiteboard is a powerful, practical tool for team collaboration. There’s also a physical jam board for when you have some collaborators on-premises while working with remote team members at the same time. You can learn more about the physical jam board by clicking here. If you need help deploying this technology in your organization, please reach out for a free consultation. We can offer equipment, training, and consulting on many whiteboard solutions.   

Using a Whiteboard in 2020 Read More »

Fun Ways to Improve Your Typing Skills

https://youtu.be/8S-6LXy57Cg Technology Tips by Centrend Podcast: Episode 3 These days, when we aren’t on camera in a web meeting, it seems like we are typing on our computer keyboards. Typing skills are essential to be productive and competitive. I’m going to show you some effective and fun ways to improve your keyboarding skills. Everyone, no matter their age, should seek to develop their typing skills as much as possible. The faster you can get your thoughts out and into the computer, the more productive your entire day will be.  In this blog, I show you several great online resources for mastering the keyboard. First, www.ratatype.com. Ratatype is a good learning tool. Many teachers send their students here, and the format is a lot like an actual typing course. If you choose to create an account and log in, the site will keep track of your progress and present increasingly challenging lessons. I find this resource invaluable for practicing those harder letter/symbol combinations that you don’t get to type often but slow you down when you do need to type them. Next, www.typeracer.com. I have to admit; this one is my favorite. It can be very entertaining! I’ve watched entire offices playing during their break time to compete for high scores! You don’t have to log in here either. You can go directly to Enter a typing race.  Like Ratatype, if you log in, the site will track your high scores. Do you have problems with technology and want things to run better? For businesses, call us at 774-241-8600.  For support for home users or individuals, visit www.whizkidsupport.com or call 774-778-2800.

Fun Ways to Improve Your Typing Skills Read More »

Review Your Cyber Security Plan in Four Simple Steps

Increasing Threats Companies rely more and more on digital information and network-enabled devices. Threats are increasing, and cybercrime is on the rise, so it’s no wonder cybersecurity is increasingly important. Is your company prepared for a cyber attack? If you are like most small/medium businesses, you don’t have a written plan at all. If you have a plan, was it well thought out and tested, or was it thrown together quickly to appease a customer’s request? Take It Seriously It’s time to seriously consider the question: How would your business perform if it is hit by a cyber attack right now?  What would you do? Who would you notify? How would you recover? Cybersecurity Threat Evolution Cyber threats are constantly evolving, making it necessary to continually ensure your cybersecurity defenses and responses are effective for your business right now. A slow or inadequate response can have a very negative impact on the bottom line, along with your reputation. Regular Cybersecurity Audits It’s not enough to have plans in place; they need to be audited regularly. When was the last time your team updated the business’s cybersecurity plans? Are the documents current, and do they still meet the needs of each department? Has network and server equipment changed since the plan was written? What about 3rd party tools and services? The Four-Step Plan Regular internal audits are a smart way to prepare for a more comprehensive external audit.  The brief internal audit I’m recommending below can ensure your cybersecurity plans are up to date and functioning as they should. Here are the four quick steps you can take right now: Step 1 – Review your plans Pull out your documents and give them a hard look. Consider whether your policies and procedures still make sense. Has any personnel changed, etc… Ensure every component of the plan has a clear purpose and that roles and responsibilities for executing the plan are clearly defined. Every aspect of your plan should clearly say who has to do what and by when in the case of a cyber-attack. Step 2 – Assess risks and exposure Have any new services been introduced that have changed where threats can originate? For example, is there new off-site data storage or new wireless access points that have come online? Have there been other infrastructure upgrades such as new server hardware, software, or cloud-based services? If you discover new risks or identify new components, make sure to update your plan to include them. Step 3 – Consider security standard Once you have reviewed and updated the plan, consider whether it meets applicable security standards. If you work with CUI data (confidential unclassified information) under NIST 800-171, for example, do you meet the requirements appropriate to your role?  Does your plan meet the requirements of your standards? How does the plan measure up to general industry best practices?  Step 4 – Test for Action Would employees be able to use the plan in the case of a security breach? Where might a breach be discovered, and who would discover it? Would that person or group know what to do? Does the plan define who they would contact and how long it would take to mitigate the breach and fully resolve the situation? If you’ve taken a look at these steps and are still unsure whether they would be effective, Centrend can help you with a professional external audit. Give us a call or submit our contact form for a free Q&A session to discuss your organization’s readiness for handling a cyber attack.

Review Your Cyber Security Plan in Four Simple Steps Read More »

Don’t Get Caught by a “Phisherman!”

https://youtu.be/FtdD_mQsTRg Technology Tips by Centrend Podcast: Episode 2 “Phishing” is a social hacking attempt to get you to reveal information that hackers can use to exploit your email or computer account. Here are some clues on how to detect a phishing attempt and what you should be looking for. Welcome to Email Phishing Anatomy 101! You cannot assume that an email you receive actually came from the sender it claims to be from. Phishers are very crafty and will do everything they can to appear familiar so that you will follow their call to action. The infographic below illustrates a very clever phishing email. “Keep Same Password” Now, what would happen if the recipient actually clicks the button? Now, what would happen if you clicked the button? You would be taken to a website that looks like an Outlook Web Access Portal and asked to do the following things: They tell you to confirm your current login name and password to “renew” it. Upon submitting your name and password, you are taken to a screen that asks for previously used passwords for verification purposes. This process is open-ended. The more time you spend time submitting passwords, the more data they collect to hack into other systems at your organization. You can do several things in your business to reduce the amount of these types of emails that actually make it through. Use a strong commercial-grade firewall with deep packet inspection. If you’re suspicious, don’t click the link. Instead, log in by going directly to the website yourself. Have strong endpoint security software on your workstations, so if you do click a link, you will get a warning like Centrend’s managed service clients get (see grap[hic at right) Centrend works hard to protect our customers from phishing by blocking many of these types of threats from ever entering your network or email folder, to begin with. Everyone gets fooled, especially if you are in a hurry. For times like this, we make sure there is local workstation security to safely check suspicious links. For example, clicking on the email below in one of our managed services environments will give the email recipient a second chance to reconsider by showing the following message: If you want to keep the phisherman from trolling your computer’s waters, give us a call or drop us a line.

Don’t Get Caught by a “Phisherman!” Read More »

Scroll to Top