Use Single Sign-On for login efficiency

No matter how valuable your cloud subscriptions are, each new set of login credentials users are forced to create and memorize adds another level of inefficiency. With Single Sign-On (SSO), you can create one user profile that logs you into all your online accounts. If you’re overwhelmed by the number of passwords linked to your name, SSO is the solution for you.

What is SSO?

Single Sign-On solutions allow you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked “Login with Google” on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, small businesses can accomplish the same level of efficiency between their employees and cloud platforms.

Instead of asking everyone in the office to track separate accounts for Office 365, Slack, Quickbooks, and whatever other cloud apps your company relies on, you can give them one set of credentials and manage what they have access to remotely. Employees come to work, enter their designated username and password, and they’re all set for the day.

Why is SSO more secure?

There are a number of ways to set up a small business SSO solution, but most of them focus on removing login information from your servers. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication — like a fingerprint or an SMS to a personal device.

Every time one of your employees visits a cloud platform, such as Office 365 or Google Apps, the SSO provider will verify the user’s identity and the security of the connection. If anything goes out of place, your IT provider will be notified.

Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices.

How to get started with SSO

The first step when setting up a Single Sign-On solution is making sure you have a healthy and responsive IT support system in place. You need a team that is constantly available to review suspicious alerts and troubleshoot employee issues. If you don’t currently have that capacity, contact us today and we’ll help you out!

Posted in General Articles C, Web & Cloud | Tagged , , , , , , , , | Comments closed

What is Single Sign-On and who is it for?

An average enterprise uses over a thousand cloud services. Even if small businesses use just a few dozen apps, securely managing account logins is still a huge problem for both users and administrators. Single Sign-On (SSO) is an excellent solution to this issue, so let’s dive into how it works.

What is SSO?

Single Sign-On solutions allow you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked “Login with Google” on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, small businesses can accomplish the same level of efficiency between their employees and cloud platforms.

Instead of asking everyone in the office to track separate accounts for Office 365, Slack, Quickbooks, and whatever other cloud apps your company relies on, you can give them one set of credentials and manage what they have access to remotely. Employees come to work, enter their designated username and password, and they’re all set for the day.

Why is SSO more secure?

There are a number of ways to set up a small business SSO solution, but most of them focus on removing login information from your servers. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication — like a fingerprint or an SMS to a personal device.

Every time one of your employees visits a cloud platform, such as Office 365 or Google Apps, the SSO provider will verify the user’s identity and the security of the connection. If anything goes out of place, your IT provider will be notified.

Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices.

How to get started with SSO

The first step when setting up a Single Sign-On solution is making sure you have a healthy and responsive IT support system in place. You need a team that is constantly available to review suspicious alerts and troubleshoot employee issues. If you don’t currently have that capacity, contact us today and we’ll help you out!

Posted in General Articles B, Web & Cloud | Tagged , , , , , , , , | Comments closed

Single Sign-On: The key to user management

Making passwords can be tedious. From complexity requirements to minimum lengths, creating a password for each new account brings its own set of headaches. If this problem is reaching a boiling point, Single Sign-On (SSO) solutions can help. These techniques are secure, easy-to-manage, and do away with the need to manage a long list of usernames and passwords.

What is SSO?

Single Sign-On solutions allow you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked “Login with Google” on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, small businesses can accomplish the same level of efficiency between their employees and cloud platforms.

Instead of asking everyone in the office to track separate accounts for Office 365, Slack, Quickbooks, and whatever other cloud apps your company relies on, you can give them one set of credentials and manage what they have access to remotely. Employees come to work, enter their designated username and password, and they’re all set for the day.

Why is SSO more secure?

There are a number of ways to set up a small business SSO solution, but most of them focus on removing login information from your servers. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication — like a fingerprint or an SMS to a personal device.

Every time one of your employees visits a cloud platform, such as Office 365 or Google Apps, the SSO provider will verify the user’s identity and the security of the connection. If anything goes out of place, your IT provider will be notified.

Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices.

How to get started with SSO

The first step when setting up a Single Sign-On solution is making sure you have a healthy and responsive IT support system in place. You need a team that is constantly available to review suspicious alerts and troubleshoot employee issues. If you don’t currently have that capacity, contact us today and we’ll help you out!

Posted in General Articles A, Web & Cloud | Tagged , , , , , , , , | Comments closed

Make the most out of old PCs

If your PC has been struggling to perform all the tasks you have at hand, we completely understand why you would be itching for a new one, or even if you’ve already replaced it with the latest model. But even if it’s old, sluggish, and always crashing, your old desktop or laptop may still prove to be useful. Here’s how you can upgrade and repurpose your old computer.

As mentioned, you have to make a few upgrades on your old PC. You may want to try a lighter OS, for example. Keep in mind that the latest version of Windows or MacOS won’t work optimally without a fast processor, so a Linux-based OS, which comes in a variety of options called “distros,” would be a better option. It will make your computer feel brand new without exhausting its hardware.

Popular distros options such as Ubuntu, elementary OS, and PinguyOS can be easily installed. Plus, they have similar interfaces to Windows and come with a boatload of software packages. The best part is they require a minimum of 4GB of RAM, so you won’t have to invest much at all.

Once you’ve upgraded your old PC, you can start using it as a NAS server, a dedicated privacy computer, or a digital media hosting platform.

Make a NAS server

Network-attached storage (NAS) is a server for your home or small business network that lets you store files that need to be shared with all the computers on the network. If your old PC has at least 8GB of RAM, you can use it as your own NAS.

Simply download FreeNAS, a software accessible on Windows, MacOS, or Linux, that enables you to create a shared backup of your computers. FreeNAS has access permissions and allows you to stream media to a mobile OS, like iOS and Android.

But if you’d rather convert your PC into a private cloud for remote access and data backup, Tonido is a great alternative. Compatible with Mac, Windows, and Linux, this free private cloud server turns your computer into a storage website, letting you access files from anywhere on any device.

Tonido offers up to 2GB of file syncing across computers, and there are even Tonido apps for iOS and Android.

Secure your online privacy

Install The Amnesic Incognito Live System (TAILS) on your old computer and enjoy your very own dedicated privacy PC.

TAILS routes all your internet traffic and requests through TOR Project, a software that makes it difficult for anyone to track you online. All of this Linux-based software’s integrated applications like web browser, Office suite, and email software are pre-configured for robust security and privacy protection.

Kick your media up a notch

Looking for a way to listen to music and podcasts or watch videos on other PCs or mobile devices? Server software like Kodi can help.

Kodi brings all your digital media together into one user-friendly package so you can use your old PC as an audio and video hosting platform. From there, you can play files on other devices via the internet. There are remote control apps for both iOS and Android, and even an app for Kodi playback on Amazon Fire TV.

Kodi works on any Windows, MacOS, and Linux computer, and even on even rooted Android and jailbroken iOS devices.

We’re always on the lookout for ways to help our clients make the most out of their technology investments. Want to know more about how to utilize hardware to your business’s advantage? Give us a call.

Posted in General Articles C, Hardware | Tagged , , , , , , , , , , , , | Comments closed

Breathe new life into your old PC

Don’t be so quick to dump that old computer! Despite being slow, clunky, and prone to crashes, your old desktop or laptop might just be perfectly usable — after a few light upgrades that will breathe new life into it and enable you to use it for other computing needs.

As mentioned, you have to make a few upgrades on your old PC. You may want to try a lighter OS, for example. Keep in mind that the latest version of Windows or MacOS won’t work optimally without a fast processor, so a Linux-based OS, which comes in a variety of options called “distros,” would be a better option. It will make your computer feel brand new without exhausting its hardware.

Popular distros options such as Ubuntu, elementary OS, and PinguyOS can be easily installed. Plus, they have similar interfaces to Windows and come with a boatload of software packages. The best part is they require a minimum of 4GB of RAM, so you won’t have to invest much at all.

Once you’ve upgraded your old PC, you can start using it as a NAS server, a dedicated privacy computer, or a digital media hosting platform.

Make a NAS server

Network-attached storage (NAS) is a server for your home or small business network that lets you store files that need to be shared with all the computers on the network. If your old PC has at least 8GB of RAM, you can use it as your own NAS.

Simply download FreeNAS, a software accessible on Windows, MacOS, or Linux, that enables you to create a shared backup of your computers. FreeNAS has access permissions and allows you to stream media to a mobile OS, like iOS and Android.

But if you’d rather convert your PC into a private cloud for remote access and data backup, Tonido is a great alternative. Compatible with Mac, Windows, and Linux, this free private cloud server turns your computer into a storage website, letting you access files from anywhere on any device.

Tonido offers up to 2GB of file syncing across computers, and there are even Tonido apps for iOS and Android.

Secure your online privacy

Install The Amnesic Incognito Live System (TAILS) on your old computer and enjoy your very own dedicated privacy PC.

TAILS routes all your internet traffic and requests through TOR Project, a software that makes it difficult for anyone to track you online. All of this Linux-based software’s integrated applications like web browser, Office suite, and email software are pre-configured for robust security and privacy protection.

Kick your media up a notch

Looking for a way to listen to music and podcasts or watch videos on other PCs or mobile devices? Server software like Kodi can help.

Kodi brings all your digital media together into one user-friendly package so you can use your old PC as an audio and video hosting platform. From there, you can play files on other devices via the internet. There are remote control apps for both iOS and Android, and even an app for Kodi playback on Amazon Fire TV.

Kodi works on any Windows, MacOS, and Linux computer, and even on even rooted Android and jailbroken iOS devices.

We’re always on the lookout for ways to help our clients make the most out of their technology investments. Want to know more about how to utilize hardware to your business’s advantage? Give us a call.

Posted in General Articles B, Hardware | Tagged , , , , , , , , , , , , | Comments closed

Great uses for an old computer

It’s inevitable. Sooner or later, you’re going to have to replace your computer. But while it may not be as fast as when you first got it or as sleek as your new computer, your old desktop or laptop might still have a lot to offer— after upgrading it a little, that is. Here are some great uses for your old computer.

As mentioned, you have to make a few upgrades on your old PC. You may want to try a lighter OS, for example. Keep in mind that the latest version of Windows or MacOS won’t work optimally without a fast processor, so a Linux-based OS, which comes in a variety of options called “distros,” would be a better option. It will make your computer feel brand new without exhausting its hardware.

Popular distros options such as Ubuntu, elementary OS, and PinguyOS can be easily installed. Plus, they have similar interfaces to Windows and come with a boatload of software packages. The best part is they require a minimum of 4GB of RAM, so you won’t have to invest much at all.

Once you’ve upgraded your old PC, you can start using it as a NAS server, a dedicated privacy computer, or a digital media hosting platform.

Make a NAS server

Network-attached storage (NAS) is a server for your home or small business network that lets you store files that need to be shared with all the computers on the network. If your old PC has at least 8GB of RAM, you can use it as your own NAS.

Simply download FreeNAS, a software accessible on Windows, MacOS, or Linux, that enables you to create a shared backup of your computers. FreeNAS has access permissions and allows you to stream media to a mobile OS, like iOS and Android.

But if you’d rather convert your PC into a private cloud for remote access and data backup, Tonido is a great alternative. Compatible with Mac, Windows, and Linux, this free private cloud server turns your computer into a storage website, letting you access files from anywhere on any device.

Tonido offers up to 2GB of file syncing across computers, and there are even Tonido apps for iOS and Android.

Secure your online privacy

Install The Amnesic Incognito Live System (TAILS) on your old computer and enjoy your very own dedicated privacy PC.

TAILS routes all your internet traffic and requests through TOR Project, a software that makes it difficult for anyone to track you online. All of this Linux-based software’s integrated applications like web browser, Office suite, and email software are pre-configured for robust security and privacy protection.

Kick your media up a notch

Looking for a way to listen to music and podcasts or watch videos on other PCs or mobile devices? Server software like Kodi can help.

Kodi brings all your digital media together into one user-friendly package so you can use your old PC as an audio and video hosting platform. From there, you can play files on other devices via the internet. There are remote control apps for both iOS and Android, and even an app for Kodi playback on Amazon Fire TV.

Kodi works on any Windows, MacOS, and Linux computer, and even on even rooted Android and jailbroken iOS devices.

We’re always on the lookout for ways to help our clients make the most out of their technology investments. Want to know more about how to utilize hardware to your business’s advantage? Give us a call.

Posted in General Articles A, Hardware | Tagged , , , , , , , , , , , , | Comments closed

Know all about Windows 10 build 18305 for PC

Microsoft is releasing Windows 10 build 18305 with a number of major features and improvements for the Start menu, Windows Security, Task Manager, File Explorer, and the Settings app.

Start menu

This now has a new single-column layout with reduced top-level tiles. This layout appears when you’re creating a new account, setting up a new device, or after performing an installation.

Windows Sandbox

Using hardware virtualization and Microsoft Hypervisor tech, this feature lets you build a lightweight environment to safely install and run untrusted applications without adversely affecting your installation.

There’s no need to create a virtual machine, and when you’re done testing the app, the environment and app will automatically be deleted.

Clipboard

Build 18305 updates the Clipboard interface (Windows key + V). Every item on the clipboard is now smaller, which allows more entries to be displayed.

Accounts

You can now use an SMS code to sign in and continue setting up your Windows 10 account if your account is connected to your phone number.

Windows Hello

Instead of creating a password that is complex and easy to forget, Windows Hello lets you use a look or a touch to sign in to your Windows 10 devices.

Build 18305 improves the PIN reset experience by giving the interface design for web and mobile the same look and feel. You’ll also come across the same interface design when performing actions that requires authentication, such as creating a new user account or verifying your account.

Settings

The Settings app has a new homepage that shows user information and provides quick access to frequently used settings.

Troubleshoot

Windows 10 will be able to automatically restore default settings for some services. Depending on your hardware configuration, it will adjust feature settings and apply changes to keep your device running smoothly.

It will also recommend troubleshooting suggestions for non-critical issues. For example, it may recommend that you disable a setting that causes an application to crash mysteriously, until the next update becomes available.

Windows Security

Starting with build 18305, the Protection history page (found in Windows Security > Virus & threat protection > Threat history) will continue to list antivirus detections, but now you’ll see more details that are easier to grasp.

In addition, any pending recommendation will have a red or yellow state throughout the experience in the history list.

Tamper protection

In Windows Security > Virus & threat protection > Virus & threat protection, you’ll find new Tamper protection settings that prevent unauthorized changes to your security settings.

Final thoughts

Enjoy the latest enhancements that Windows 10 build 18305 has to offer, but do be wary of installation problems, sign-in difficulties, and app crashes. To maximize the benefits while minimizing the risks, consult with us. Our experts know how to pick and implement the latest tech advancements that will further your business goals.

Posted in General Articles C | Tagged , , , , | Comments closed

Our guide to Windows 10 build 18305 for PC

In this Windows 10 build 18305 guide, we’ll focus on the most important changes that Microsoft carried out for the 2019 major release.

Start menu

This now has a new single-column layout with reduced top-level tiles. This layout appears when you’re creating a new account, setting up a new device, or after performing an installation.

Windows Sandbox

Using hardware virtualization and Microsoft Hypervisor tech, this feature lets you build a lightweight environment to safely install and run untrusted applications without adversely affecting your installation.

There’s no need to create a virtual machine, and when you’re done testing the app, the environment and app will automatically be deleted.

Clipboard

Build 18305 updates the Clipboard interface (Windows key + V). Every item on the clipboard is now smaller, which allows more entries to be displayed.

Accounts

You can now use an SMS code to sign in and continue setting up your Windows 10 account if your account is connected to your phone number.

Windows Hello

Instead of creating a password that is complex and easy to forget, Windows Hello lets you use a look or a touch to sign in to your Windows 10 devices.

Build 18305 improves the PIN reset experience by giving the interface design for web and mobile the same look and feel. You’ll also come across the same interface design when performing actions that requires authentication, such as creating a new user account or verifying your account.

Settings

The Settings app has a new homepage that shows user information and provides quick access to frequently used settings.

Troubleshoot

Windows 10 will be able to automatically restore default settings for some services. Depending on your hardware configuration, it will adjust feature settings and apply changes to keep your device running smoothly.

It will also recommend troubleshooting suggestions for non-critical issues. For example, it may recommend that you disable a setting that causes an application to crash mysteriously, until the next update becomes available.

Windows Security

Starting with build 18305, the Protection history page (found in Windows Security > Virus & threat protection > Threat history) will continue to list antivirus detections, but now you’ll see more details that are easier to grasp.

In addition, any pending recommendation will have a red or yellow state throughout the experience in the history list.

Tamper protection

In Windows Security > Virus & threat protection > Virus & threat protection, you’ll find new Tamper protection settings that prevent unauthorized changes to your security settings.

Final thoughts

Enjoy the latest enhancements that Windows 10 build 18305 has to offer, but do be wary of installation problems, sign-in difficulties, and app crashes. To maximize the benefits while minimizing the risks, consult with us. Our experts know how to pick and implement the latest tech advancements that will further your business goals.

Posted in General Articles C, Windows | Tagged , , , , | Comments closed

Build 18305: Latest Windows 10 update for PC

Here’s a preview of Windows 10 build 18305 and the best improvements Microsoft has implemented so far.

Start menu

This now has a new single-column layout with reduced top-level tiles. This layout appears when you’re creating a new account, setting up a new device, or after performing an installation.

Windows Sandbox

Using hardware virtualization and Microsoft Hypervisor tech, this feature lets you build a lightweight environment to safely install and run untrusted applications without adversely affecting your installation.

There’s no need to create a virtual machine, and when you’re done testing the app, the environment and app will automatically be deleted.

Clipboard

Build 18305 updates the Clipboard interface (Windows key + V). Every item on the clipboard is now smaller, which allows more entries to be displayed.

Accounts

You can now use an SMS code to sign in and continue setting up your Windows 10 account if your account is connected to your phone number.

Windows Hello

Instead of creating a password that is complex and easy to forget, Windows Hello lets you use a look or a touch to sign in to your Windows 10 devices.

Build 18305 improves the PIN reset experience by giving the interface design for web and mobile the same look and feel. You’ll also come across the same interface design when performing actions that requires authentication, such as creating a new user account or verifying your account.

Settings

The Settings app has a new homepage that shows user information and provides quick access to frequently used settings.

Troubleshoot

Windows 10 will be able to automatically restore default settings for some services. Depending on your hardware configuration, it will adjust feature settings and apply changes to keep your device running smoothly.

It will also recommend troubleshooting suggestions for non-critical issues. For example, it may recommend that you disable a setting that causes an application to crash mysteriously, until the next update becomes available.

Windows Security

Starting with build 18305, the Protection history page (found in Windows Security > Virus & threat protection > Threat history) will continue to list antivirus detections, but now you’ll see more details that are easier to grasp.

In addition, any pending recommendation will have a red or yellow state throughout the experience in the history list.

Tamper protection

In Windows Security > Virus & threat protection > Virus & threat protection, you’ll find new Tamper protection settings that prevent unauthorized changes to your security settings.

Final thoughts

Enjoy the latest enhancements that Windows 10 build 18305 has to offer, but do be wary of installation problems, sign-in difficulties, and app crashes. To maximize the benefits while minimizing the risks, consult with us. Our experts know how to pick and implement the latest tech advancements that will further your business goals.

Posted in General Articles B, Windows | Tagged , , , , | Comments closed

Tips on how to manage Google reviews

Getting Google reviews for your business has never been more important. Consumers are scouring the internet for online reviews to help them in their purchase decisions, and Google’s new search algorithm is designed to lead people to high-quality products and services.

 

How Google changed search results

Google now automatically aggregates and includes online reviews to display in the Knowledge Panel found on the right side of the search results. This useful panel displays information like address, hours, web address, and more.

Which review sites does Google include?

Relevant sites vary between industries, so if, for instance, you manage a restaurant, reviews from Yelp or Zagat will likely be displayed next to your online listings. If your business is a bit more niche, however, there are a few steps you can take to determine which review sites affect you.

To determine these sites, go to Google and type the following:

“[your company name] reviews” – to locate sites that already have reviews on your business
“[industry] reviews” – to determine industry reviews sites you should be listed on
“[industry + location] reviews” – to find review boards where you can boost your local presence

Then, list the review sites you found on the first page of each search query and categorize them based on their search ranking and your company’s current rating on them.

After creating the list, write down an objective for each review site. This can range from getting listed on the site to improving your rating.

To narrow down your choices, focus your review-generating efforts on the five most popular websites on your list, especially those that include negative reviews of your business.

Getting reviews

Regardless of your objectives for managing reviews, the most important thing is for people to write reviews about your products and services. With that in mind, here are a few strategies to encourage people to rave about your business.

Send follow-up emails
You could send a short message thanking them for purchasing your product or service, with a request for a review.

Simplify the review process
Many customers skip writing reviews due to the complex steps and instructions involved. You need to simplify this process by having a review site widget that customers can easily access, asking them to comment on your service before they leave your website.

Offer rewards for reviews
Another way to encourage people to rate your business is by presenting them with a chance to win free goods or services if they submit a review.

There are a lot of steps involved in managing your online reputation, but starting early is the key to enhancing your SEO, attracting new customers, and improving your bottom line.

Contact us today if you need more advice on climbing up Google’s search rankings or tips on social media management.

Posted in General Articles C, Social Media | Tagged , , , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.