Four Improvements Microsoft Should Make With Windows 9

September 29th, 2014

Microsoft sign

The public will get a long-awaited preview tomorrow of the newest version of the Windows operating system. Microsoft is currently using the code name ‘Windows Threshold”, but that’s expected to become Windows 9 before release. At ZDNet, Adrian Kingsley-Hughes put together a list of features he wants to see from the newest operating system if it’s going to keep up with the competition.

  • Streamlined Updates

The updating process has been a complaint of Windows users for about as long as there has been a Windows operating system. Keeping your operating system fully updated helps to keep your system secure and compatible with new technology. But, the current method leaves a lot to be desired. Among the complaints are how long it takes to fully update and patch a system, even in Windows 8. There also seems to always be updates available, which is frustrating when you just finished rebooting from an update. Speaking of, reboots should be kept to a minimum given how disruptive they are to typical users. Finally, it’s rare that all available updates are able to be installed without issue. It seems there are always a few that refuse to install correctly for some reason. Improving this process would allow more users to run up to date systems.

  • Windows Recovery

While you’d like to think a catastrophic failure won’t happen to you, it’s still a good idea to plan ahead just in case. When a Mac encounters this serious problem, there’s a fairly simple recovery process that can be done”over the air”. For a Windows user however, you’re left trying to remember where you put all of those disks or keys that came with your operating system or computer. Most users won’t know off-hand where those tools are months or years after purchase. But, as Apple demonstrates, they shouldn’t be necessary.

  • Desktop Specific Experience

It’s understandable that Microsoft would want to include tablet users into their Windows audience with Windows 8 given how popular tablets have become recently. Unfortunately, the way they chose to target tablet users forced desktop users to suffer through features that weren’t specifically designed for them. Instead of trying to satisfy both the desktop and mobile audiences, Microsoft would be better off focusing Windows 9 on desktop users only and having a different operating system, or at least a modified version, for tablets.

  • Easier Backups

Creating backups of the data stored on your computer is advice that’s relevant to most security and protection tips. Regardless of what catastrophes befall your desktop, if you’ve backed up your data recently, you should be able to recover. Unfortunately, Microsoft hasn’t made the back up process simple enough. What should be a primary feature designed to be easy to use for everyone is actually mostly hidden and only used by more advanced users.

We’ll find out soon what advances Microsoft has made with Windows 9. Whether or not you plan to upgrade your system, Geek Rescue is here to help when there’s problems. Come by or call us at 918-369-4335.

For your business solutions needs, visit our parent company JD Young.

Secure Your iPhone In Three Steps

September 25th, 2014

Touch ID on iPhone

Whether you just bought a new iPhone 6 or 6+, or you are sticking with your older model, it’s important to take some time to properly secure your smartphone. Apple includes some effective features for protecting your device that don’t take long to implement. At the Symantec blog, Satnam Narang put together the three steps that all iPhone owners need to take to secure their phone.

  • Touch ID

The fingerprint scanner isn’t a new feature on the iPhone 6, it actually debuted on the 5S. It is, however, arguably the best way to keep other people from being able to use your device. If you didn’t enable Touch ID on the initial setup of your phone, you can do so through the settings menu. Not only will you now be required to scan your fingerprint to unlock your smartphone, but you’ll also be able to make purchases from iTunes, the App Store and Apple Pay. Even if your iPhone doesn’t have Touch ID, you can still take this opportunity to set a passcode on your device. Reportedly, about a third of smartphone users have no protection whatsoever set when unlocking their phones, which means if their phone is lost or stolen, who ever has it also has access to everything on it.

  • Apple ID Password

Your Apple ID password is required for many functions. You use it to make purchases, or enable iCloud features. If your Apple ID account is compromised, it could be very costly to you. So, make sure your password is long and strong. Apple requires at least 8 characters, at least one uppercase letter and one lowercase letter and at least one number. That’s a great start but you can make it even stronger by making it longer and including a symbol like an exclamation point or question mark. Be sure the password you use also isn’t the same as one you’ve used for other online accounts. When you re-use passwords, you introduce the possibility that one site can be hacked and multiple accounts of yours can be compromised.

  • Two-Step Verification

Even with a strong, unique password, there are risks that your account could be hacked into. That’s why it’s also important to implement two-step verification, which adds a layer of protection by having your verify your device with a unique code or PIN. To enable it, log in to your Apple ID account and open the ‘Password and Security” options. You’ll be given a PIN to enter that verifies that you’re the owner of the device and anyone trying to log-in to your account with a different device will need that PIN. You’ll also be given a Recovery Key in case you lose access to your account yourself.

These three steps greatly reduce the risk that anyone else will be able to use your iPhone or steal the data saved to it.

If you’re having other problems with your iPhone or other devices, bring them to Geek Rescue or give us a call at 918-369-4335.

For your business solutions needs, visit our parent company JD Young.

How To Fix Slow WiFi Plaguing iOS 8

September 23rd, 2014

WiFi symbol on iPhone

Apple’s latest mobile operating system, iOS 8, has been available to the public for about a week now and, predictably, the bugs and issues are starting to trickle out. While there haven’t been any major problems reported, one annoyance has plagued many users. Thankfully, as Leslie Horn reports for Gizmodo, there’s a quick fix for users who are experiencing slow WiFi connections in iOS 8.

This isn’t an issue that is spread to all iOS 8 users, but there has been a significant number of complaints that WiFi seems slower since the upgrade. That extends to multiple models of iPhones and iPads too.

If the slow connection is troubling you, one solution would be to simply turn off WiFi on your device. But, if you’re using an iPad without a data plan, or have limited data on your smartphone, this isn’t exactly a good option either.

To fix the problem, there are a couple of options. First, try resetting your network settings. For some users, this brought WiFi speeds back up. If that doesn’t help, the other option is disabling WiFi Networking. To do so, go to Settings>Privacy>Location Services>System Services and turn WiFi Networking to off.

This is the first widespread bug reported for iOS 8, but it’s unlikely to be the last. While Apple will likely work quickly to patch and fix any issues that surface in the next few weeks, it’s not a bad idea to stick with iOS 7 if you can until more of these bugs are found and fixed.

If you’re having trouble with any of your mobile devices, bring them to Geek Rescue or call us at 918-369-4335.

For your business solutions needs, visit our parent company JD Young.

Seven Features New To iOS 8

September 22nd, 2014

Apple symbol

You’ve likely heard plenty about iOS 8 in the past week and may have even updated your Apple device, but do you really know what iOS 8 is capable of? More importantly, do you know why it’s better than the previous operating system, iOS 7? At Gizmodo, David Nield put together a handy list of “things you can do on iOS 8 that you couldn’t do on iOS 7”. Here are seven new features that are most useful.

  • Third Party Keyboards

This new feature has actually gotten quite a bit of publicity and led others to wonder why it was never before possible to add a different keyboard to an iPhone. There have been many complaints about the native keyboard in iOS, although just about every digital keyboard has its quirks. Now, you can go find the keyboard that fits your typing habits best.

  • Battery Usage

Here’s another feature that surprisingly wasn’t already available. By going to Settings>General>Usage>Battery Usage, you’ll be able to see how each app is affecting your battery. This could prove to be extremely useful in situations where your battery is low and you’re nowhere near a charger. Or, could help you decide if a new app is worth the trouble or not.

  • Timelapse Video

Creating timelapse videos is now possible by simply enabling an option in the Camera app. One frame of video will be captured each second. These timelapse videos will then be saved to your photo stream with a timer icon in the corner to help you identify them.

  • Escape Group Texts

Group texts between multiple contacts are handy, but can quickly become an annoyance. In iOS 8, you’re now able to remove yourself from group chats you no longer want to be a part of. Select the ‘Details’ option from conversation screen to see this option and other new choices.

  • Voice Messages

If you’re ever in a position where you don’t want to send a text message, but also don’t want to talk on the phone, there’s the new feature of Voice Messages. These are simply short audio recordings you can send directly to contacts. It’s like leaving them a voicemail, but quicker. In iMessage, press and hold the record button to start a new message, or press play to hear a message you’ve received.

  • Timed Photos

A timer has been a standard feature for digital cameras for years and now your iPhone can take pictures on a three to ten second delay. To enable this feature, tap the timer icon in the Camera app and then quickly gather your relatives for a group shot.

  • Scan Credit Cards

First, Apple Pay will let you purchase items without having your credit card with you. You’ll load the card’s information into Apple Pay and then pay directly with your iPhone. A useful idea, but also one that makes your phone even more valuable to criminals. Adding your card’s information to Apple Pay could be tedious, but iOS 8 enables the ability to scan credit cards. You can also use this feature when buying items online. Just use the ‘Scan Credit Card’ option in Safari.

If your iPhone or iPad have any kind of issues, bring your device to Geek Rescue or call us at 918-369-4335.

For your business solutions needs, visit our parent company JD Young.

How Mobile Apps Lead To Data Theft

September 19th, 2014

Mobile apps concept

Most computer users have embraced their need for effective security tools, like firewalls and antivirus programs. Mobile device users have yet to fully understand the risks associated with their devices, however. This becomes a serious problem when those unescured devices are connected to businesses’ networks and gaining access to valuable data. As Teri Robinson reports for SC Magazine, the insecurity often stems from apps.

IT Research firm Gartner reports that three-quarters of mobile apps will fail to meet basic security standards. This isn’t a problem that’s likely to go away soon, either, as Gartner estimates that apps won’t begin to improve until 2016 at the earliest.

Businesses are continuing to embrace the use of third-party commercial apps and mobile computing. There are a number of benefits of doing so, but there are also inherent risks. Currently, most security tools available focus on on-premises access, rather than individuals accessing data remotely. As one CEO put it, “they are built to solve yesterday’s problems”.

In the case of apps, security is rarely the primary focus. Testing is likely done before the app hits the market, but it’s usually for usability and functionality.

In attacks exploiting insecure apps, companies’ servers are vulnerable, which allows for the loss of data that’s either critical to operations, or critical to customers.

Better testing and more intelligent security tools are needed to adequately protect servers from the uses employees have already put into action. In this case, the cart has come before the horse with mobile devices being used to access more data than they’re currently secured for.

At Geek Rescue, we have the capabilities necessary to handle any of your organization’s IT needs, including improving security. Give us a call at 918-392-0745.

For your other business solutions needs, visit our parent company JD Young.

Five Setting To Change In iOS 8 For Privacy

September 18th, 2014

Smartphone with mobile security

Now that iOS 8 is available to be downloaded on older devices, and with the iPhone 6 set to be released tomorrow, it’s time to identify the risks involved with the new operating system. Any new OS comes with some default settings that need to be changed to maximize the security and privacy of your device. At ZDNet, Zack Whittaker helps locate the settings that users should change immediately after adding iOS 8 to their phones and tablets.

  • Location tracking in apps

You may have noticed that a number of apps request access to track your location even when it doesn’t seem to make any sense for them to do so. Even worse is that these apps often try to continue tracking your location when they’re not in use. In iOS 8, you’ll be prompted with a pop-up notification informing you that an app wants to track your location “even when you are not using the app”. In most cases, you’ll want to tap “Don’t Allow” when confronted with this pop-up. If you find out later that the app really does need your location, you can always change this selection in the app settings.

  • Apps uploading data

Another problematic characteristic of apps is their insistence that you give them access to your personal data like your contacts, email, photos and calendar. Social networking apps might use these to help you find friends who are also using the app. But others don’t have any real functionality tied to this data. Instead, the app simply uploads this information to their servers, which means this data is in another location where it can be stolen and used against you. To stop this, go to the ‘Settings’ menu and select ‘Privacy’. Then, you can go and select which apps have access to certain data on your device.

  • Find My iPhone

If you lose your phone, this feature is your best hope for finding it. This feature also allows you to lock or remotely erase your phone in the event of theft and your phone will send its location to Apple’s servers just before it powers down. To enable it, again head to the ‘Settings’ menu, then ‘iCloud’ and select ‘Find my iPhone’.

  • Expiration of iMessages

iOS 8 introduces the option to send voice and video messages through iMessage. Unfortunately, messages of any kind sent with iMessage are available to anyone with access to your device. That means if you keep messages saved forever, anyone could go back and read, listen or watch them. To prevent that, enable the option to have messages expire after a specified amount of time. Head to ‘Settings’, ‘Messages’ then ‘Keep Messages’ to see your options.

  • Ad tracking

Most users don’t want advertisers to be able to track their location and data, but they can do just that through the Safari web browser if the right settings aren’t changed. While you aren’t likely to stop the practice altogether, you can limit the data collected by going to the ‘Settings’ menu, then ‘Privacy’ and ‘Advertising’. Enable ‘Limit Ad Tracking’ and use the ‘Reset Advertising Identifier’ option.

These are the settings most users will want to change immediately once they’ve either downloaded iOS 8 or purchased their new iPhone 6. These changes don’t make your device completely secure, but they do help.

If any of your devices are in need of a fix, bring them to Geek Rescue or call us at 918-369-4335.

For business solutions needs, visit our parent company JD Young.

Four Reasons To Wait To Upgrade To iOS 8

September 17th, 2014

Apple iPhone

Apple’s latest mobile operating system, iOS 8, is set to be made available today, just ahead of the release of the iPhone 6. The new OS is compatible all the way back to the iPhone 4S, although installing it on older devices is bound to come with some issues. Before you upgrade your device to iOS 8, however, Zack Whittaker of ZDNet suggested a few reasons why waiting is a better option.

  • App Compatibility

Apple makes new operating systems available to developers well ahead of their official release. This way, apps can be tested and made compatible for users when they decide to upgrade their device. However, not every app on your phone or tablet is likely to work with iOS 8 immediately. You can bet that Facebook, Twitter and other well-known, widely distributed apps will be compatible and may even have some additional features. However, other apps may either not be getting an update, or may be stuck in the Apple queue, waiting for the updated version to be approved so it can make it’s way to the App Store.

  • No Jailbreaks

Many users take the opportunity to “jailbreak” their devices, which voids the warranty but allows them additional functionality and compatibility. It usually takes a few weeks for a new version of iOS to get hacked and a new jailbreak to be made available, however. And so far, there hasn’t been much news at all about jailbreaks for iOS 8. So, if you rely on your device to be jailbroken, updating to iOS 8 is not a wise choice.

  • Initial Bugs

As with any large scale update, there will be bugs for early adopters. These will likely be fairly minor, but could lead to some major annoyances. If you don’t have a good reason to upgrade your device, and it’s working well currently, then waiting a few weeks to adopt iOS 8 could save you from these issues as Apple will patch and update to fix the bugs as they’re reported.

  • No Downgrading

Before upgrading any device, it’s wise to create a back-up of all of your files, just in case the upgrade wipes out anything you wanted to keep. Even with back-ups, once you’ve upgraded to iOS 8, downgrading back to iOS 7 is not easy. In fact, Apple doesn’t support the most common ways of downgrading a device and it takes unofficial apps and software. So, the choice to upgrade isn’t one to be taken lightly.

Despite these potential problems, iOS 8 has its advantages over previous versions of Apple’s operating systems. However, it isn’t worth rushing into.

If you need help with your iPhone, iPad or any other device, come by Geek Rescue or call us at 918-369-4335.

For your business solutions needs, visit our parent company JD Young.

The iPhone 6 Does Not Feature A Sapphire Glass Screen. Why Not?

September 15th, 2014

Smartphone with screen shattering

Apple has officially introduced the iPhone 6 to the public, which means the months of speculation about the specifications of the new device are over. Now, questions about why Apple chose to include certain details can take over. One of the first questions many had after the iPhone 6’s release was about the decision to use ion-strengthened glass screens instead of sapphire glass. Apple signed a contract with the manufacturer of sapphire glass, GT Advanced Technologies, in November of 2013, which fueled theories that the glass would take over as the material for iPhone screens. As Jason Hahn reports for Digital Trends, there are a few reasons why that didn’t occur for the iPhone 6.

The first obstacle for sapphire glass was the short deadline before the iPhone 6’s release. A 10-month period wasn’t enough time to produce, test and perfect a new smartphone screen.

It appears that, at least at some point, the plan was to include sapphire glass on the iPhone 6, but the screens were unable to pass drop tests. Not only could the sapphire glass not withstand standard drop tests, it also came at a premium price. Those two factors made an alternative to sapphire glass a necessity for the iPhone 6.

Apple isn’t ready to move on from sapphire glass yet though. It will be featured on the Apple Watch, which has the tech world buzzing. Oddly, it’s rumored that the Apple Watch Sport will instead feature the same ion-strengthened glass as the iPhone 6.

While the latest iPhone will likely be an improvement over previous models in terms of durability, it’s still far from unbreakable. Many critics hoped the inclusion of sapphire glass would finally end the days of cracked screens, but that will have to wait for now. The wait for the new iPhone 6 will be over September 19th.

If you have a cracked screen, other broken hardware or are just having trouble with your iPhone, bring it to Geek Rescue or call us at 918-369-4335.

For your business solutions needs, visit our parent company JD Young.

Millions Of Google Accounts At Risk After Passwords Stolen

September 10th, 2014

Stolen password concept

Despite the inherent dangers, many users continue to use the same password over and over again for all of their online accounts. Doing so makes it significantly easier to break into those accounts and, when one account is compromised, it greatly increases the risk to other accounts as well. That issue is the reason that a recent theft of Gmail addresses and passwords could potentially lead to millions of compromised accounts. As Lucian Constantin reports for PC World, 5-million email addresses and accompanying passwords were dumped in plain text on an online forum, recently.

The Gmail addresses all have a corresponding password with them, but that password isn’t necessarily the password to the user’s Google account. Instead, it’s suspected that rather than hacking Google to steal this information, cyber criminals have hacked other sites over the span of months or even years to compile this list. By hacking other sites that require an email address to register, the criminals were able to compile a list of Gmail accounts with a possible password that that user has used in the past.

So, for those users who re-use passwords, an unknown number of people could now know both their Gmail address and the password they need to log into it. Thanks to Google’s all-inclusive nature of accounts, compromising an individual Gmail account could also mean compromising their Google+ page, YouTube account, Google Drive and any other Google service being used.

It’s unconfirmed how many of the 5-million addresses and passwords are valid, but it’s estimated that at least 60-percent could be used successfully. That means that about 3-million Gmail users have their log-in credentials available online in plain text. Even if you don’t re-use passwords, this still seems like an ideal time to change not only your Gmail password, but also your password to other important online accounts as well.

At Geek Rescue, we have the expertise to enhance security at home or at the office and on any type of internet-ready device. If you have questions or concerns regarding the security of your devices, call us at 918-369-4335.

For other business solutions, visit our parent company JD Young.

Google Is Offering To Replace Broken Nexus 5 Smartphones For Free

September 5th, 2014

Google building

Breaking your smartphone is a terrible experience. That’s especially true when your phone is fairly new. For some lucky Nexus 5 owners, a broken phone can be easily replaced at no cost. As Robert Sorokanich reports for Gizmodo, Google is offering to replace any broken Nexus 5 handsets for free, regardless of how the device was broken.

Google is calling this offer a “special exception” that’s only available to US customers. There’s been no word on why Google is willing to replace broken smartphones and they’ve actually been pretty quiet about the offer.

There are a couple of qualifiers to the deal. First, users must have bought their Nexus 5 through the Google Play Store. Those who have broken their device can then call Google to order a refurbished but otherwise new smartphone. Your credit card will be charged the full price for the replacement phone, but will be refunded once Google has received your broken phone.

The number to call is (855) 836- 3987.

Motorola and HTC have also offered free phone replacement deals in the past. Often, it’s a way to clear out back inventory for older devices. The Nexus 5 is in no way old, but it has been on the market for nearly a year, which means Google is likely trying to clear room for the next model.

If you qualify, this is an excellent opportunity to avoid having to either use a broken smartphone, or pay full price for a new one.

If you have a broken smartphone that doesn’t qualify for a free replacement, Geek Rescue is here to help. Call us at 918-369-4335.

For your business solutions needs, visit our parent company JD Young.