Imagine IT (i)nsights

Imagine IT Insights

How consumer habits changed the web

June 29th, 2018 Imagine IT 2018june29webandcloud_a, content, personalization, image size, instant gratification, loading time, web, Web & Cloud 2018june29webandcloud_a, content, personalization, image size, instant gratification, loading time, web, Web & Cloud

The average web user’s attention span gets shorter every day. People don’t want to spend hours sifting through a website to find the information they need; they want it as soon as the page loads. To keep up with the times businesses have drastically changed how they develop their websites.

How to minimize risks after a data breach

June 28th, 2018 Imagine IT 2018june28business_a, business, business continuity, cybersecurity, data breach, data recovery, tips 2018june28business_a, business, business continuity, cybersecurity, data breach, data recovery, tips

Despite efforts to protect your data, some breaches are beyond your control. When an online company with your personal details gets hacked, you have no choice but to manage your risks on your own. These practical tips can help you reduce risks of identity theft and other threats.

How to wipe data from your old smartphone

June 27th, 2018 Imagine IT 2018june27android_a, security, android, data wipe, device, encryption, factory reset, smartphone 2018june27android_a, security, android, data wipe, device, encryption, factory reset, smartphone

Our mobile phones contain some of our most private data. There are contact details, confidential business emails, financial information, and possibly even risqué pictures that you wouldn’t want falling into the wrong hands. Factory reset is one way to get rid of everything if you’re moving on from your old phone, but there are a few other things...

How to ensure collaboration tools adoption

June 25th, 2018 Imagine IT 2018june25voip_a, collaboration tools, microsoft teams, phased deployment, google hangouts, hipchat, skype, slack, voip, yammer 2018june25voip_a, collaboration tools, microsoft teams, phased deployment, google hangouts, hipchat, skype, slack, voip, yammer

Businesses continue to install tools like Skype, Slack, Yammer, HipChat, Google Hangouts, and Microsoft Teams, but many struggle to get users to adopt them. Adoption, however is not something that comes overnight; it requires in-depth strategies. Here are ways to ensure people make use of your collaboration tools.

Top 7 Office 365 Productivity Add-Ons

June 22nd, 2018 Imagine IT 2018june22office_a, office, office tabs, pexels, add-ons, docusign, findtime, grammarly, microsoft office 365, productivity, staffhub, translator 2018june22office_a, office, office tabs, pexels, add-ons, docusign, findtime, grammarly, microsoft office 365, productivity, staffhub, translator

Microsoft’s cloud-based Office 365 has successfully made day-to-day business operations more efficient with popular apps like Word, PowerPoint, Excel, OneNote, and Outlook. What’s more, it also offers productivity-boosting add-ons that streamline users’ workflow.

The new features in Windows 10 Redstone 5

June 21st, 2018 Imagine IT 2018june_windows_a, redstone 5, windows, windows 10 2018june_windows_a, redstone 5, windows, windows 10

Hot on the heels of the Windows 10 April 2018 Update, also known as Redstone 4, is the highly anticipated release of Redstone 5. While no official launch date has been announced, word is that it will drop around the final quarter of 2018. What can we expect from this latest major update?

Router malware worse than experts realize

June 20th, 2018 Imagine IT 2018june20security_a, passwords, router, Security, cybersecurity, factory reset, Hardware, malware, man in the middle attacks, vpnfilter 2018june20security_a, passwords, router, Security, cybersecurity, factory reset, Hardware, malware, man in the middle attacks, vpnfilter

In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn’t taken action against it.

What’s new at the 2018 Apple WWDC?

June 19th, 2018 Imagine IT business, photos, 2018june19apple_c, apple, ios, ipad, ipod, siri, watchos, wwdc business, photos, 2018june19apple_c, apple, ios, ipad, ipod, siri, watchos, wwdc

San Jose, California, recently hosted WWDC 2018. Apple’s engineers interacted with the developers in attendance, while everyone at the event got a sneak preview at the computer manufacturer’s upcoming products and software. Check out the highlights from the event right here!

Hide & Seek: New IoT malware to watch out for

June 15th, 2018 Imagine IT 2018june15hardware_a, business, business it, botnet, hide and seek, iot, malware 2018june15hardware_a, business, business it, botnet, hide and seek, iot, malware

You probably think your Internet of Things (IoT) devices don’t need as much protection as your PCs or laptops. Newsflash: They’re actually even more vulnerable to hacking. In fact, researchers have discovered a terrifying strain of IoT malware that can infect your devices.

Chrome to mark HTTP as 'not secure'

June 14th, 2018 Imagine IT browsers, chrome, Security, security, 2018june14webandcloud_a, android, encryption, google, http, https, isp, let’s encrypt, lighthouse, mac, Web & Cloud, windows browsers, chrome, Security, security, 2018june14webandcloud_a, android, encryption, google, http, https, isp, let’s encrypt, lighthouse, mac, Web & Cloud, windows

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as "not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes.

Battle of the mobile OS: Android vs. iOS

June 12th, 2018 Imagine IT mobile operating systems, os, 2018june12android_a, android, iphone mobile operating systems, os, 2018june12android_a, android, iphone

It normally takes you hours of watching phone reviews on YouTube to decide which model or brand to buy. And for your business, you assume that it’s pretty straightforward since your team will use it only for client communication. But with the multitude of efficient apps available for remote working nowadays, that is not the case anymore. Determine...

Why VoIP is best with remote workers

June 7th, 2018 Imagine IT 2018june7voip_a, remote working, telecommuting, voice-over-internet protocol, voip 2018june7voip_a, remote working, telecommuting, voice-over-internet protocol, voip

More and more Americans are working out of the office than ever before. A Gallup poll revealed that since 1996, the number of remote workers increased fourfold, with 37 percent of Americans working from their homes, coffee shops, or coworking spaces. Remote working is changing the set-up of the workplace, and it’s easy to see why.

Flash to be stopped in Office 365

June 6th, 2018 Imagine IT 2018june6office_c, office, office 365, Security, adobe, flash, html5, microsoft, shockwave, silverlight 2018june6office_c, office, office 365, Security, adobe, flash, html5, microsoft, shockwave, silverlight

If you are one of the few Office 365 users who embeds Silverlight, Shockwave, or Flash content in your documents, your pastime will soon be a thing of the past. Over a week ago, Microsoft announced that Office 365 would completely block said media by January 2019.

Little-known Windows 10 tips and tricks

June 5th, 2018 Imagine IT 2018june5windows_a, business, night light, focus assist, microsoft, windows, windows 10 2018june5windows_a, business, night light, focus assist, microsoft, windows, windows 10

Are you making the most out of your Windows 10 computer? If you haven’t tried adjusting system and battery performance, silenced notifications, or used the night light function, then you’re missing out on minor but useful features.

How to defend against insider threats

June 5th, 2018 Imagine IT 2018june4healthcare_a, Security, cybersecurity, Healthcare, hipaa, insider threat, protected health information 2018june4healthcare_a, Security, cybersecurity, Healthcare, hipaa, insider threat, protected health information

First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing healthcare records without authorization. Healthcare companies must take steps to reduce the potential for insider threats, which is their top source of security incidents.

Malware hits 500k IoT devices, Talos reports

June 1st, 2018 Imagine IT mikrotik, nas, netgear, Security, 2018june1security_a, doj, fbi, linksys, malware, vpnfilter mikrotik, nas, netgear, Security, 2018june1security_a, doj, fbi, linksys, malware, vpnfilter

A week ago, leading cyber threat intelligence team Cisco Talos reported that no less than 500,000 IoT devices in up to 54 countries were infected by new malware called VPNFilter. An earlier version, believed to be launched by a nation-state, targeted Ukraine.