update | TechSolutions, Inc. Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation. Wed, 02 Mar 2022 13:42:10 +0000 en-US hourly 1 https://www.techsolutionsinc.com/wp-content/uploads/2020/05/favicon.png update | TechSolutions, Inc. 32 32 A primer on watering hole attacks https://www.techsolutionsinc.com/blog/a-primer-on-watering-hole-attacks/ https://www.techsolutionsinc.com/blog/a-primer-on-watering-hole-attacks/#respond Wed, 31 Jul 2019 00:00:18 +0000 https://www.techsolutionsinc.com/blog/a-primer-on-watering-hole-attacks/ Cyberattacks come in many different forms, with new methods being developed all the time. What’s bad is that personal information is now often stored online, be it through social media or through government and healthcare services — and these are juicy targets for criminals. Learn more about one way these criminals steal data — through […]

The post A primer on watering hole attacks appeared first on TechSolutions, Inc..

]]>

Cyberattacks come in many different forms, with new methods being developed all the time. What’s bad is that personal information is now often stored online, be it through social media or through government and healthcare services — and these are juicy targets for criminals. Learn more about one way these criminals steal data — through watering hole attacks.

What are watering hole attacks?

Watering hole attacks are used to distribute malware onto victims’ computers in a similar way phishing activities are conducted. Cybercriminals infect popular websites with malware, and anyone who has had the misfortune to visit have their computers automatically loaded with malware.

The malware used in these attacks usually collects the target’s personal information and sends it back to the hacker’s server. In extreme cases, the hacker will actively take control of the infected computer.

But how does a hacker choose which websites to hack? With internet tracking tools, hackers find out which websites companies and individual users visit the most. They then attempt to find vulnerabilities in those websites and embed them with malicious software.

With such highly skilled hackers these days, virtually any website can fall victim to a watering hole attack. In fact, even high-profile websites like Twitter, Microsoft, Facebook, and Apple were compromised in 2013.

You can protect yourself by following these tips:

Update your software
Watering hole attacks often exploit holes and vulnerabilities to infiltrate your computer, so by updating your software and browsers regularly, you can significantly reduce the risk of an attack. Make it a habit to check the software developer’s website for any security patches. Or better yet, hire a managed IT services provider to keep your system up to date.

Watch your network closely
Regularly conduct security checks using your network security tools to try and detect watering hole attacks. For example, intrusion prevention systems allow you to detect suspicious and malicious network activities. Meanwhile, bandwidth management software will enable you to observe user behavior and detect abnormalities that could indicate an attack, such as large transfers of information or a high number of downloads.

Hide your online activities
Cybercriminals can create more effective watering hole attacks if they compromise websites only you and your employees frequent. As such, you should hide your online activities with a VPN and your browser’s private browsing feature. Also, block social media sites from your office network, as these are often used as share points of links to infected sites.

At the end of the day, the best protection is staying informed. As cyberthreats continue to evolve, you must always be vigilant and aware of the newest threats. Tune in to our blog to find out about the latest developments in security and to get more tips on how to keep your business safe.

Published with permission from TechAdvisory.org. Source.

The post A primer on watering hole attacks appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/a-primer-on-watering-hole-attacks/feed/ 0
Tips for safeguarding business data https://www.techsolutionsinc.com/blog/tips-for-safeguarding-business-data/ https://www.techsolutionsinc.com/blog/tips-for-safeguarding-business-data/#respond Tue, 11 Jun 2019 00:00:51 +0000 https://www.techsolutionsinc.com/blog/tips-for-safeguarding-business-data/ You can’t afford to lose business data. It takes away the trust of your clients, leading to loss of revenue. Cybercriminals are here to stay, so it’s more important than ever to utilize tight security measures to keep your business data safe. Still, some hackers may have advanced cracking skills, or are really determined to […]

The post Tips for safeguarding business data appeared first on TechSolutions, Inc..

]]>

You can’t afford to lose business data. It takes away the trust of your clients, leading to loss of revenue. Cybercriminals are here to stay, so it’s more important than ever to utilize tight security measures to keep your business data safe. Still, some hackers may have advanced cracking skills, or are really determined to break into your network, so it’s a good idea to use the following methods for safeguarding your corporate data.

Use Two-Factor Authentication

Using a complicated password to secure your system is no longer an effective way to solve the issue of cybersecurity. We tend to use that same complex password in our email accounts or bank accounts, and if one of your logins is compromised, this can result in grave consequences.

Two-factor authentication (2FA) adds an extra layer of security for your systems and accounts. It can be biometric verification for devices that you own, or a time-sensitive auto-generated code that is sent to your mobile phone. This security feature works in the same way websites would require you to confirm your email address. They want to make sure that you’re not a bot or anything else.

Encrypt all data

Encryption is a great obstruction to hackers, since it scrambles and descrambles data every time someone tries to read it. Encryption also causes compatibility issues if the data is not being accessed via the company’s own network systems. While applying encryption can be costly, it is certainly well worth the money if it can protect your business data from falling into the wrong hands.

Keep systems up to date

Technology is moving at a fast pace. Hackers are always upgrading their tools to take advantage of outdated security systems, so companies should do likewise to protect their valuable resources. Yet many companies don’t install software updates immediately. If the update closes existing security loopholes, delaying an update exposes you to external attacks. So install software updates as soon as they are released.

Back up frequently

Although you’ve implemented several layers to your security, sometimes hackers can still find their way in. This is why you need to back up data frequently, whether it’s on-site, off-site, or by way of cloud backups. In the worst-case scenario where your systems do get infiltrated, you can restore lost data from those backups.

Monitor connectivity

Many businesses have no idea how many computers they have, so it’s very hard to keep track of which computers are online. Sometimes a company’s computers and servers are online when they don’t need to be, making them tempting targets for attackers. It’s advisable to configure business servers properly, ensuring that only necessary machines are online and that they’re well-protected.

It’s much more expensive to recover from a data breach than to prevent one. If you’re looking to protect your business IT systems for potential threats, contact us today so we can help.

Published with permission from TechAdvisory.org. Source.

The post Tips for safeguarding business data appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/tips-for-safeguarding-business-data/feed/ 0
Beware of watering hole attacks! https://www.techsolutionsinc.com/blog/beware-of-watering-hole-attacks/ https://www.techsolutionsinc.com/blog/beware-of-watering-hole-attacks/#respond Wed, 18 Apr 2018 00:00:01 +0000 https://www.techsolutionsinc.com/blog/beware-of-watering-hole-attacks/ Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack. What are watering hole attacks? Much like phishing, […]

The post Beware of watering hole attacks! appeared first on TechSolutions, Inc..

]]>

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack.

What are watering hole attacks?
Much like phishing, a watering hole attack is used to distribute malware onto victims’ computers. Cybercriminals infect popular websites with malware. If anyone visits the site, their computers will automatically be loaded with malware.

The malware used in these attacks usually collects the target’s personal information and sends it back to the hacker’s server. Sometimes the malware can even give hackers full access to their victims’ computers.

But how does a hacker choose which websites to hack? With internet tracking tools, hackers find out which websites companies and individual users visit the most. They then attempt to find vulnerabilities in those websites and embed them with malicious software.

Any website can fall victim to a watering hole attack. In fact, even high-profile websites like Twitter, Microsoft, Facebook, and Apple were compromised in 2013.

You can protect yourself by following these tips.

Update your software
Watering hole attacks often exploit bugs and vulnerabilities to infiltrate your computer, so by updating your software and browsers regularly, you can significantly reduce the risk of an attack. Make it a habit to check the software developer’s website for any security patches. Or better yet, hire a managed IT services provider to keep your system up to date.

Watch your network closely
To detect watering hole attacks, you must use network security tools. For example, intrusion prevention systems allow you to detect suspicious and malicious network activities. Meanwhile, bandwidth management software will enable you to observe user behavior and detect abnormalities that could indicate an attack, such as large transfers of information or a high number of downloads.

Hide your online activities
Cybercriminals can create more effective watering hole attacks if they compromise websites only you and your employees frequent. As such, you should hide your online activities with a VPN and your browser’s private browsing feature.

At the end of the day, the best protection is staying informed. As cyberthreats continue to evolve, you must always be vigilant and aware of the newest threats. Tune in to our blog to find out about the latest developments in security and to get more tips on how to keep your business safe.

Published with permission from TechAdvisory.org. Source.

The post Beware of watering hole attacks! appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/beware-of-watering-hole-attacks/feed/ 0
Windows 10 updates for Fall 2017 https://www.techsolutionsinc.com/blog/windows-10-updates-for-fall-2017/ https://www.techsolutionsinc.com/blog/windows-10-updates-for-fall-2017/#respond Sat, 27 May 2017 00:00:24 +0000 https://www.techsolutionsinc.com/blog/windows-10-updates-for-fall-2017/ Windows 10’s Fall Creators Update is the next major update that Microsoft will roll out in September. Besides reusing the same “Creators Update” name and focusing on bringing the Windows experience to iOS and Android devices, here are some noteworthy features users can expect. Timeline It’s designed to grant Windows 10 users freedom to switch […]

The post Windows 10 updates for Fall 2017 appeared first on TechSolutions, Inc..

]]>

Windows 10’s Fall Creators Update is the next major update that Microsoft will roll out in September. Besides reusing the same “Creators Update” name and focusing on bringing the Windows experience to iOS and Android devices, here are some noteworthy features users can expect.

Timeline
It’s designed to grant Windows 10 users freedom to switch between multiple devices, including iOS and Android phones. Timeline lets you pick up from where you left off if you’re switching between multiple Windows 10 devices. With the Cortana integration, this will even extend to some Microsoft apps on iOS and Android. This useful new feature will be accessible via Window 10’s Task View.

OneDrive Files on Demand
This feature allows you to access all your cloud-based files without having to download them in order to optimize your device’s storage space. What’s more, you won’t have to change the way you work, because all your files — even those online — can be seen in File Explorer, and they work just like every other file on your device.

Cloud clipboard
The Windows 10 Fall Creators Update brings a cloud-powered clipboard that lets you copy information from one Windows 10 device and paste it onto another. And this isn’t limited to text alone either. On top of that, it supports Android and iOS devices if you use Microsoft’s SwiftKey virtual keyboard.

Pick up where you left off
As the name suggests, it basically allows you to start working on your PC and continue working on your phone when you are away from your PC (and vice-versa). Currently, the feature works only between Windows 10 PCs in the Windows 10 Creators Update — but with the upcoming Fall Creators Update for Windows 10, Microsoft will be integrating this capability into your phones as well.

My People
It was originally announced as a key feature in the April’s Creator Update, but will be launched in the coming Fall Creators Update. This feature lets you pin a number of connections to your taskbar — three, in the current Insider preview — and stay in constant touch with them. It defaults to Skype, but you can choose an alternative if you’d like.

These are just a handful of the nifty features users can expect from Windows 10 Fall Creators Update. For more information, don’t hesitate to contact us. We’re more than happy to help.

We’ll keep you updated on the latest developments.

Published with permission from TechAdvisory.org. Source.

The post Windows 10 updates for Fall 2017 appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/windows-10-updates-for-fall-2017/feed/ 0
Outlook update enhances user experience https://www.techsolutionsinc.com/blog/outlook-update-enhances-user-experience/ https://www.techsolutionsinc.com/blog/outlook-update-enhances-user-experience/#respond Tue, 01 Nov 2016 00:00:17 +0000 https://www.techsolutionsinc.com/blog/outlook-update-enhances-user-experience/ As far as communication goes, there are numerous factors to consider, especially when that communication is done online rather than in person. Since its inception, Microsoft Outlook has always been an excellent communication tool. And now, with its recent update, it can do an even better job at helping people communicate with one another quickly […]

The post Outlook update enhances user experience appeared first on TechSolutions, Inc..

]]>

2016october31_office_aAs far as communication goes, there are numerous factors to consider, especially when that communication is done online rather than in person. Since its inception, Microsoft Outlook has always been an excellent communication tool. And now, with its recent update, it can do an even better job at helping people communicate with one another quickly and easily. Learn and take advantage of the changes that Outlook’s update makes to the user experience.

Improved Contact Cards
One of the most welcome changes with the Outlook update is that the concept of the Contact Card has been greatly improved upon. In previous manifestations of Outlook, the information about contacts that was quickly available was limited to basic information such as name, phone number, and email address. With the new Outlook, Contact Cards can contain a person’s job title, their relationship to you, and what your most recent communications were so that you can better remember who you are talking to and what you were talking about.

Smarter Search Features
Searching contacts, emails, and other features of Outlook is easier with the latest update. Search features are now smarter in that they can go off of the first letter you type and retrieve your most frequent search requests starting with that letter. This speeds up searching and helps retrieve relevant information in seconds, not minutes.

People Section Enhancements
Outlook has also made some major improvements and enhancements to the ‘main people’ section of Outlook. You can now create smart lists of people based on common features. This will include your most frequently contacted people, groups based on job titles or departments, favorites, and those who need follow-up. These lists makes sending group emails to relevant contacts much simpler because you don’t have to scour all your contacts to find the right people.

Now that you know some of the ways that Outlook has changed the user experience with its latest updates, you can begin to put these to use in your business. Contact us to help you navigate those changes and put the benefits to use in your business and personal communications.

Published with permission from TechAdvisory.org. Source.

The post Outlook update enhances user experience appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/outlook-update-enhances-user-experience/feed/ 0
Fantom: the latest cybersecurity spectre https://www.techsolutionsinc.com/blog/fantom-the-latest-cybersecurity-spectre/ https://www.techsolutionsinc.com/blog/fantom-the-latest-cybersecurity-spectre/#respond Thu, 08 Sep 2016 00:00:10 +0000 https://www.techsolutionsinc.com/blog/fantom-the-latest-cybersecurity-spectre/ It’s hard to deny how quickly the different types of ransomware multiply — they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like […]

The post Fantom: the latest cybersecurity spectre appeared first on TechSolutions, Inc..

]]>

2016September7_MicrosoftWindowsNewsAndTips_AIt’s hard to deny how quickly the different types of ransomware multiply — they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like many other things, these technologically menacing forces are like “a wolf in sheep’s clothing” — impending danger lurks beneath the most seemingly innocent guises.

AVG security researcher Jakub Kroustek recently spotted Fantom coded atop an EDA2, a ransomware-building kit that was open-sourced but eventually taken down. EDA2 contained certain flaws that allowed researchers to obtain decryption keys from its C&C server, yet these flaws have since disappeared, indicating that Fantom coders might have found and fixed them before anyone else had a chance to.

Very little is known as to how Fantom is distributed. As for the method of deployment, cybercriminals plant the file onto the target’s computer via spam email or exploit kits. Fantom-infected files are named criticalupdate01.exe; they utilize a “Windows Security Update” to prompt targets into running the file.

After activation, the ransomware starts by locking the user’s screen while displaying fake Windows Update graphics, complete with a fully-functioning percentage-based loading timer that mirrors the original Windows Update screen. However, beneath this pleasant facade, Fantom is encrypting your files right before your eyes. Luckily, the temporary lock screen is removable before it reaches 100% — simply press CTRL+F4. Unfortunately, the encryption process remains intact.

The MalwareHunterTeam states, “The ransomware uses classic ransomware encryption by locking files using an AES-128 key and then encrypting this key with a dual RSA key, with the private key stored on the crook’s server, and a public key left on the user’s PC.”

In order to retrieve the private key to unlock your files, you must contact the perpetrators by email. The email address is listed in the ransom note that appears after the process of encryption is complete. Fantom displays ransom notes in the form of HTML and TXT files, while changing the user’s desktop with a custom screenshot that lists the contact details. Lastly, after completing all its operations, Fantom cleans after itself by running two batch scripts wiping all the installation files clean.

Ransomware isn’t new, but the ways that cybercriminals utilize them are. Who would’ve thought that the ever so familiar Windows Update window has fallen prey to malicious intent? Pretend that you’re the Little Red Riding Hood and that the wolf is the ransomware that cybercriminals have disguised as your grandmother. They no longer wait to trap you, instead, they wait for you to walk straight into one instead.

The issue of ransomware is as extensive as it is meticulous. If you have any questions about Fantom or would like to request more information, feel free to get in touch with us! Give us a call or send us an email. Our dedicated staff are more than happy to help.

Published with permission from TechAdvisory.org. Source.

The post Fantom: the latest cybersecurity spectre appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/fantom-the-latest-cybersecurity-spectre/feed/ 0
6 useful new features coming to iOS 10 https://www.techsolutionsinc.com/blog/6-useful-new-features-coming-to-ios-10/ https://www.techsolutionsinc.com/blog/6-useful-new-features-coming-to-ios-10/#respond Thu, 14 Jul 2016 00:00:52 +0000 https://www.techsolutionsinc.com/blog/6-useful-new-features-coming-to-ios-10/ Non-techie Apple iPhone lovers relish in the magic hour ensuing a beta’s release. Those of us in the industry break down every minute detail and flock to our digital soapboxes to proclaim what we usually deem apocalyptic news. The sun is setting on Apple’s iOS 10 magic hour, and we’re here to pass judgement for […]

The post 6 useful new features coming to iOS 10 appeared first on TechSolutions, Inc..

]]>

2016July13_iPhone_ANon-techie Apple iPhone lovers relish in the magic hour ensuing a beta’s release. Those of us in the industry break down every minute detail and flock to our digital soapboxes to proclaim what we usually deem apocalyptic news. The sun is setting on Apple’s iOS 10 magic hour, and we’re here to pass judgement for you in the form of our favorite new features coming soon to your phone.

New lock screen

Changes to any mobile operating system (OS) almost always include updates to the lockscreen. However, this is no ordinary update. For the first time since the iPhone’s release in 2007, there’s no ‘Slide to Unlock’ feature. Instead, the screen provides in-depth, 3D touch-activated notifications displaying more detail than before without having to unlock your phone. The iPhone will automatically display the lock screen any time you pick it up, and you can unlock it by pressing the ‘Home’ button.

New widgets

Another upgrade visible on the lockscreen and homescreen is the long-awaited addition of ‘widgets.’ These are basically compartmentalized apps that run on a portion of your screen without having to open the app entirely. With iOS still in beta, the list of available widgets is already quite long, but iTunes controls, weather and calendar are a few of the standout native widgets. Don’t worry though, Apple is allowing third party widgets from the likes of ESPN, Google Maps and Amazon. They can be accessed by swiping from left to right on your lock screen or page one of your home screen.

3D touch on control center shortcuts

The iPhone 6s has been out long enough that most people have had a chance to interact with its 3D Touch feature, which performs different actions based on how much force you apply when tapping the screen. When combining 3D Touch functionality with the ‘Control Center’ dock that appears with a flick of the finger from the bottom of the screen upwards, each function displays ‘Favorite’ actions. For example, if you use a slightly more forceful touch on the Camera shortcut, you’re presented with the options to jump straight to Traditional, Slow Motion, Video or Selfie recording.

New/rich notifications

We see a lot more of 3D Touch throughout iOS 10, and another place it’s quite evident is notifications. Whether it’s on the lock screen or the notification center, a strong 3D Touch will open a small window that allows you to interact with that app without opening it completely. This is especially helpful for replying to messages and emails. In addition to this– something that may seem small to some, but huge to others, is the ability to hide all your notifications with just two taps. Simply press hard on the ‘X’ button in the upper right, and then click ‘Clear All Notifications.’

Handwritten messages

The iPhone’s native Messages app got a thorough overhaul, but we’ll leave the discovery of emojis, invisible ink and ‘fireworks’ for another time. Those don’t have much place in the business world, but handwritten messages certainly do. Give your professional messages a more personal, attentive touch by writing responses with your fingers with the app’s Digital Touch option.

‘Delete’ stock apps

Unfortunately, you can’t get back valuable storage space by deleting unnecessary native apps. But you can finally remove them from your home screen. Don’t have an iWatch and don’t see why you need to have the app on your phone, albeit tucked away in a folder on page three? Press and hold on the app, tap the shaking X, and tap ‘Remove.’ All gone.
iOS 10 is one of the most significant updates the iPhone has ever received. It’s still another month away from widespread release, but if you’d like to install the beta now, or you just want to learn more about how to automatically convert text to emojis, we’re your guys. Open up your boring, old Messages, and drop us a line. We’ll have you sending handwritten messages in no time.

Published with permission from TechAdvisory.org. Source.

The post 6 useful new features coming to iOS 10 appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/6-useful-new-features-coming-to-ios-10/feed/ 0
Android plans to add exciting new core features https://www.techsolutionsinc.com/blog/android-plans-to-add-exciting-new-core-features/ https://www.techsolutionsinc.com/blog/android-plans-to-add-exciting-new-core-features/#respond Tue, 07 Jun 2016 00:00:57 +0000 https://www.techsolutionsinc.com/blog/android-plans-to-add-exciting-new-core-features/ Google has announced another batch of features coming to your Android phone, possibly as soon as next month. Although some of the items are simple and subtle integrations and others are far more grandiose, they’re all going to drastically improve the performance of your phone. Since some people view their mobile device as something akin […]

The post Android plans to add exciting new core features appeared first on TechSolutions, Inc..

]]>

2016June6_AndroidPhone_AGoogle has announced another batch of features coming to your Android phone, possibly as soon as next month. Although some of the items are simple and subtle integrations and others are far more grandiose, they’re all going to drastically improve the performance of your phone. Since some people view their mobile device as something akin to an extension of their body, let’s take an in-depth look at the new things you’ll be able to do.

Split Screen

The most visible and exciting feature is Android’s new ‘split-screen’ functionality. Soon you will be able to enter your ‘overview’ mode (the button that shows all of your open apps in a rolodex style queue), click and hold on an app like YouTube and drag it to the top of your screen where it will dock. The bottom half of your screen will remain in ‘overview’ mode, allowing you to select an app to occupy the bottom half of the screen. With this update, sending an email while YouTube is open won’t cause any interruption in either of the two programs. It’s the same as having two monitors, just on a much smaller scale.

Because phone manufacturers get to layer their own components on top of Google’s core Android operating system, Samsung and LG already have a few ‘split-screen’ devices. However, by integrating this item into every Android phone regardless of manufacturer, app developers will have more incentive to optimize their product for this feature or even develop new apps designed entirely around this functionality.

Fast App Switching

Do you ever find yourself switching back and forth between two apps? Maybe you need to write an email on your phone, while using a web page as reference material. Switching between the two can really slow down the flow of your work, and Google has finally addressed this by improving the ‘overview’ interface. In addition to limiting the number of displayed programs and adding a ‘clear all’ button, Android mobile devices will get ‘fast app switching’. With this feature a simple double tap of your ‘overview’ button will switch to the last program you used. After switching to the previous app, you can double tap again to return to the original app. It’s simple, but goes a long way.

Updated Notification Window

Next up is a small change to the native notification window. At the moment, if one app has multiple notifications they all get grouped into one vague ‘card’ in your notification window. I/O announced that in the future users will be able to tap on one of those cards to expand it for more detail. Instead of just seeing that you have six emails from various users, you’ll be able to see more information and access response actions for each individual notification within apps.

Instant Apps

How many times have you installed an app that you didn’t want, but needed for a one-time use? Whether it’s to purchase tickets, gain access to a promotion or receive something from a friend who uses the app, it can be a lengthy and tedious process. With ‘Instant Apps’ Android will give you the option to temporarily load software, similar to a webpage, so you can access the service without actually downloading the unnecessary app. Google promises this will take mere seconds compared to the time it currently takes to download and install full programs before using them.

Some tech writers have cited ‘Instant Apps’ as actually faster than loading a website, with all of the security and safety of an app. Additionally, while the 3 features before this one will be released for phones with the most recent OS update, Google is making ‘Instant Apps’ available to developers for any phone running anything newer than the Jellybean OS.

In general, Android phones offer a lot more customization and developer-specific options when compared to Apple’s mobile devices. However, that can mean a lot more upkeep as well. If you’re having trouble maintaining your Android device’s peak capacity or need help managing their updates, don’t hesitate to call us.

Published with permission from TechAdvisory.org. Source.

The post Android plans to add exciting new core features appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/android-plans-to-add-exciting-new-core-features/feed/ 0
Should you upgrade to iOS 9? Read this first https://www.techsolutionsinc.com/blog/should-you-upgrade-to-ios-9-read-this-first/ https://www.techsolutionsinc.com/blog/should-you-upgrade-to-ios-9-read-this-first/#respond Thu, 05 Nov 2015 02:00:31 +0000 https://www.techsolutionsinc.com/blog/should-you-upgrade-to-ios-9-read-this-first/ Apple’s iOS 9 has been available for download for nearly two months now. If you have yet to upgrade, you may wonder whether or not you should. Not everyone has been happy with the new OS, and Apple is still working out the kinks. So if you’re on the fence as to whether or not […]

The post Should you upgrade to iOS 9? Read this first appeared first on TechSolutions, Inc..

]]>

164_mob_AApple’s iOS 9 has been available for download for nearly two months now. If you have yet to upgrade, you may wonder whether or not you should. Not everyone has been happy with the new OS, and Apple is still working out the kinks. So if you’re on the fence as to whether or not you should update, here’s what you need to know about iOS 9 and four of its most handy features.

Introducing the News App

If you waste countless minutes everyday visiting different websites searching for your news, now you no longer have to. Pre-installed in iOS 9 is a new app called News. This app collects articles from a variety of news organizations and sources, and puts them in one place for your viewing convenience. Once you start using this app it will learn what type of stories you are interested in, and then gather articles to suit your unique tastes.

Improved Notes

The Notes app has gotten a major overhaul in iOS 9 and has some nifty new features. First off, you can now add checklists and bullets to your notes. So if you’re about do some shopping at the supermarket, forget about the traditional paper written grocery list. Instead, you can create your list in the Notes app and check off each item as you put it in your cart. Additionally, you can now insert maps or photos into a note, and even sketch a drawing with the tip of your finger.

Better battery

While a long battery life is not something smartphones are known for, the iPhone is making steps to improve it with iOS 9. The core technologies and built-in apps of the new OS now consume less power, which means you may be able to squeeze out an extra hour of battery life after updating.

Furthermore, iOS 9 now comes with Low Power Mode, which helps to conserve battery life. So if you’re nowhere near an outlet, and are praying you have enough power to last for the next few hours, Lower Power Mode is your savior. To turn it on, go to Settings and Battery.

And if these new battery improvements for iOS 9 aren’t already outstanding enough, now you can also find out which apps are sucking the most juice out of your battery. In Settings > Battery, click on Battery Percentage to see a list of apps you’ve used in the past 48 hours and the percentage of your battery life they have consumed. This will help you quickly identify the apps that are draining your power, so you can close them to prevent further battery loss.

Switching between apps is easier than ever

From time to time, every iPhone user needs to toggle between apps. Whether you’re switching between Mail and Safari, or Notes and iBooks, doing this can feel like an unnecessary annoyance as you are forced to return to your Home screen before switching. With iOS 9, not anymore. In a progression from the app switchers seen in previous iterations of iOS, now if you’re in Safari and want to return to your email, a little black button in the top left hand corner gives you the option. In this case, it will read Back to Mail. Just tap on it and you can return to your mail without first having to return to the home screen. This feature works for any two apps you’re toggling between.

So should you update to iOS 9?

Upgrading to iOS 9 is a big deal, as it is for any OS update to your iPhone. The reason? Once you do it, it’s nearly impossible to go back. While the four features mentioned above may sound appealing, here are some things to consider when deciding whether or not to update to iOS 9.

Owners of older versions of the iPhone, such as 4S, 5, and 5S, may be wary about reports that updating to iOS 9 has caused noticeable slowdown on these versions. For example, it can cause delays in launching and switching between apps, slow down camera performance, and lead to your phone taking longer to turn on.

However, it should be noted that if you choose to put off updating, you may leave your phone at risk to security vulnerabilities. What’s more, you may not be able to update to the latest version of apps as they will, at one point or another, no longer work with an older OS.

Whether you choose to update to iOS 9 or stick with your current version, our experts are happy to fill you in as to which is the best decision for you. Contact us today to learn more about iOS 9 or get support for any of your iPhone needs.

Published with permission from TechAdvisory.org. Source.

The post Should you upgrade to iOS 9? Read this first appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/should-you-upgrade-to-ios-9-read-this-first/feed/ 0