Imagine IT (i)nsights

Imagine IT Insights

Windows 10: New accessibility features

March 30th, 2018 Imagine IT 2018march30windows_a, accessibility, microsoft, operating system updates, windows, windows 10 2018march30windows_a, accessibility, microsoft, operating system updates, windows, windows 10

Microsoft is working on improvements for Windows 10’s accessibility features, which will be introduced later in the year. Some of these are already available to preview through the Insider Program, but everyone else will have to wait. Here’s what’s coming:

Ready for tax season phishing scams?

March 29th, 2018 Imagine IT 2018march29security_a, confidential, cyberthreat, data, information, phishing, scam, Security, security 2018march29security_a, confidential, cyberthreat, data, information, phishing, scam, Security, security

As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take extra precautions between now and April 17th to avoid hackers from selling your confidential data in the dark web.

How to protect data on iOS 11

March 28th, 2018 Imagine IT 2018march28apple_a, apple, ios 11, ipad, iphone, mobile, privacy 2018march28apple_a, apple, ios 11, ipad, iphone, mobile, privacy

Many iPhone users are aware that Apple apps access their device’s data. But this can mean increased security risk, especially if your phone is used for both personal and business reasons. Fortunately, iOS 11 includes privacy controls to limit data access.

Can private browsing keep you safe?

March 27th, 2018 Imagine IT 2018march27webandcloud_a, chrome, edge, firefox, online privacy, opera, private browsing, safari, security, vpn, Web & Cloud, web browsers 2018march27webandcloud_a, chrome, edge, firefox, online privacy, opera, private browsing, safari, security, vpn, Web & Cloud, web browsers

Privacy is a precious commodity in this era. Every website you visit or app you download leaves a digital footprint that can be tracked by anyone. Fortunately, major web browsers all offer private browsing features to keep your internet activity somewhat safe from prying eyes.

Endure tech disasters with external support

March 23rd, 2018 Imagine IT 2018march23business_a, breaches, business, it, network, outsource, security, system, technology 2018march23business_a, breaches, business, it, network, outsource, security, system, technology

Three decades ago, the notion of hiring specialists in information technology was virtually unheard of. Nowadays, the majority of businesses are digitally operated, which means technology specialists are a must, especially given the huge increase in different types of security breaches. Determine how external support can back you up in times of...

5 Android changes to look forward to

March 22nd, 2018 Imagine IT 2018march22android_a, android, android p, google, indoor positioning, machine learning, security, update, volume slider 2018march22android_a, android, android p, google, indoor positioning, machine learning, security, update, volume slider

Google has recently released an early preview of Android P, the next major release after Android Oreo. While we still don’t know what sweet treat the update will be named after, software developers have already had the chance to play with some of the features. Here are five changes you can look forward to later this year.

Hypervisor security vulnerabilities

March 21st, 2018 Imagine IT 2018march21virtualization_a, hypervisor, security, server, update, virtual machine, virtualization, vm, vm escape 2018march21virtualization_a, hypervisor, security, server, update, virtual machine, virtualization, vm, vm escape

Regardless of how complex the technology, hackers always find a way to exploit it. In the past, virtualization was thought to be an extremely secure solution businesses could rely on to improve IT management and save money. But it does have exploitable vulnerabilities. Hackers can attack the hypervisor to access your systems.

4 reasons to record your calls

March 20th, 2018 Imagine IT 2018march20voip_a, business reputation, businesses, call recording, customer satisfaction, customer service, employee performance, office tool, voip 2018march20voip_a, business reputation, businesses, call recording, customer satisfaction, customer service, employee performance, office tool, voip

Call recording is not a new feature in VoIP but rather one that is underutilized especially in businesses with less focus on customer communication. When used correctly, it can boost customer satisfaction and strengthen business reputation.

Make the most of Office 365

March 16th, 2018 Imagine IT 2018march16office_a, apps, flow, microsoft, microsoft teams, office, office 365, planner, powerapps, sharepoint, yammer 2018march16office_a, apps, flow, microsoft, microsoft teams, office, office 365, planner, powerapps, sharepoint, yammer

Maximizing your Office 365 investment is easier said than done. Sure, you use Outlook and SharePoint all the time, but there are loads of features you’re probably not using. If you’re looking for ways to make the most out of your Office 365 subscription, you’re in luck because that’s what we’re discussing today.

How to speed up Windows 10 updates

March 15th, 2018 Imagine IT 2018march15windows_a, network, patch management, performance, slow, startup software, storage, windows, windows 10 update 2018march15windows_a, network, patch management, performance, slow, startup software, storage, windows, windows 10 update

Keeping up with Windows 10 updates is absolutely critical if you want the latest features and security fixes on your computers. However, the updates can take hours, especially when a major new feature is being released. Fortunately, there are a few things you can do to speed things up.

More leaks from Equifax breach

March 14th, 2018 Imagine IT 2018march14security_a, credit freeze, dark web monitoring, data breach, equifax, fraud alert, Security, security 2018march14security_a, credit freeze, dark web monitoring, data breach, equifax, fraud alert, Security, security

The Equifax breach in 2017 exposed the personal information of 145.5 million people in the US and some parts of the UK and Canada, but the number of victims keeps increasing. In the beginning of March, the credit-reporting company revealed that more personal information was leaked. Read on to find out more about this latest development.

Government agency finds way to unlock iPhones

March 13th, 2018 Imagine IT 2018march13apple_a, apple, breach, cybersecurity, hackers, ios, iphone, jailbreak, leaks, security 2018march13apple_a, apple, breach, cybersecurity, hackers, ios, iphone, jailbreak, leaks, security

Cellebrite, an Israel-based vendor that works with the U.S. government, has revealed that they've found a way to unlock practically every iPhone available on the market. It appears to be a significant milestone for law enforcement and forensic specialists, yet it’s also a potential privacy issue for Apple customers.

Google Drive improves comment feature

March 8th, 2018 Imagine IT 2018march8business_a, business, excel, features, g suite, google drive, images, microsoft office, pdf, powerpoint 2018march8business_a, business, excel, features, g suite, google drive, images, microsoft office, pdf, powerpoint

Google recently launched a new feature on Google Drive that will improve collaboration. Users can now use a combination of Microsoft Office and G Suite while working with their teammates and clients. This update allows them to conveniently comment on Office files, images, and PDFs in the ‘Preview’ pane of Drive. Learn how you can take advantage of...

The importance of HTTPS

March 7th, 2018 Imagine IT 2018march7webandcloud_a, chrome, encryption, firefox, http, https, https everywhere, phishing, security, Web & Cloud, web browsing 2018march7webandcloud_a, chrome, encryption, firefox, http, https, https everywhere, phishing, security, Web & Cloud, web browsing

Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. Let’s go over some user-friendly HTTPS best practices to help you surf the web safely.

Android phones worth using for business

March 6th, 2018 Imagine IT 2018march6android_a, android, google, Hardware, mobile device, requirements, security, smartphone 2018march6android_a, android, google, Hardware, mobile device, requirements, security, smartphone

From Samsung to Huawei to HTC, there are plenty of Android smartphones available to consumers and businesses. But the choices get even more confusing as smartphone manufacturers release new models every year. That’s why Google compiled a list of devices to help you choose.

Top 3 ways to prevent Spectre and Meltdown

March 5th, 2018 Imagine IT 2018march5healthcare_a, data breach, data storage, Healthcare, meltdown, patches, security, server, spectre 2018march5healthcare_a, data breach, data storage, Healthcare, meltdown, patches, security, server, spectre

Data security is critical to the healthcare industry. Hospitals and clinics need to ensure medical records are protected at all times to stay HIPAA-compliant. But with Spectre and Meltdown affecting every server, all healthcare providers are at risk of data breach.

VoIP Hardphones vs Softphones

March 1st, 2018 Imagine IT 2018march1voip_a, connectivity, customer service, hardphone, ip, softphone, telephony solution, voip 2018march1voip_a, connectivity, customer service, hardphone, ip, softphone, telephony solution, voip

You have just decided to use VoIP as your telephony solution, but now your technician is asking how you want to use it. Do you want traditional desk phones (hardphone) or software-based devices (softphone)? Read on to discover the benefits of each and which ones are most suitable for your needs.